http://www.nruns.com/_downloads/advisory28122011.pdf

Should we add some randomization to prevent abuse?

It's hard to anticipate how folks might leverage apr, and how malicious
folks might then seek to exploit computational workload vectors.

Thoughts?

Reply via email to