logoalt Hacker News

tigerintheyesterday at 9:54 PM1 replyview on HN

Why do you say so?


Replies

Joel_Mckayyesterday at 10:03 PM

Best to look at security policy using ecological predator-prey models. If you don't, than you fall victim to the assumption a "puzzle" you can't break is unbreakable in general.

Nuisance users don't publish CVE, and a zero trust model shows you something important. =3

show 1 reply