Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

First you should configure some kind of authentication. It is fun to remember this 3 years old Tesla example [1]: Publicly accessible Kubernetes Dashboard.

[1] https://www.zdnet.com/article/tesla-systems-used-by-hackers-...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: