
Made some notes on how Cursor works under the hood based on their security documentation - it turns out an organization's list of subprocessors offers a loose form of "view source" for their infrastructure!
simonwillison.net/2025/May/11/cu…
English
Post








