Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

or just use commercial NGFW which uses combination of ASIC and specialized compute cores to decrypt and inspect traffic inline and block threats. They are very capable, but very expensive


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: