Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

1) There is the problem of identification, which seems to be the object of this exercise. TheSixtyOne wants to have a program that can red flag certain correlated behaviors that they might not otherwise notice or be able to quantify. You can't really go undercover if you can't spot the criminals in the first place.

2) There is the question of labor. I doubt TheSixtyOne has a large enough staff to devote one or more employees to the task of infiltration. Infiltration is not the easiest skill to just pick up. Nor are voting rings actually made up of multiple people. As the test prompt states, it could just be one person with multiple sockpuppets. How do you infiltrate a one-person voting ring?



How do you infiltrate a one-person voting ring?

This should go on a list of startup koans somewhere.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: