Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's funny. I had a similar analogy with some legacy systems recently. No one seemed to own or know where the data egressed to or whether it was even used anymore.

But it was also low-value data and even in the worst case we surmised the most we'd do is anger someone in marketing briefly.

I think so long as you can ascertain that the stakes are low, this is a good tactic.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: