• jmcs@discuss.tchncs.de
    link
    fedilink
    arrow-up
    0
    ·
    6 months ago

    When your entire security model consists of obfuscation and sticking your head in the sand, sweeping the vulnerabilities under the proverbial rug is the obvious course of action.