Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Extremely valid point, I'd consider this close to table stakes.

Also, in some more "interesting" settings there's also exploit-loaded documents to be aware of, here's from a leak I've been following lately:

> If you really want to open a Word document from Psy-Group, please go ahead, knock yourself out. Below are the links to the Word document as well as the email. Just remember that Mr. [...] mistake might have been opening a Word file from Psy-Group in the first place…

I took the liberty to remove the name as I guess that particular guy is probably suffering enough at the moment.



Documents may also have a unique wording for each recipient and the source could be easily identified by that by whoever created a document.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: