Follow

security, programming 

The problem with thinking in terms of "security-critical" and "non-security-critical" to determine where security is 'important', is that adversaries know this too and so what actually happens is that they hack into your "non-security-critical" system and then use that to gain access to the super-secure security-critical one

· · Web · 0 · 0 · 5
Sign in to participate in the conversation
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.