Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Even if the meandering list of risks Zed documents are serious and cannot be mitigated, Tor still is useful for all kinds of situations.

This article isn't that useful without knowing the nature of what Zed doesn't use Tor for.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: