in security design you already assume everything is untrusted until proven otherwise, most trusted components are limited and internal, and whatever external “trust” exists is limited to the bare minimum

Reply to this note

Please Login to reply.

Discussion

No replies yet.