Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm genuinely interested: How does UA sniffing for, e.g. a device class, introduce security issues that wouldn't exist w/o it?


UA isn’t the cause of security issues the same thought process or lack there off that led to UA being used as a proxy for compatibility in this cause is.

But in a more general view reliance on an unreliable and user controlled data for decision making is a pretty common pitfall in the security world.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: