logoalt Hacker News

Joel_Mckayyesterday at 10:03 PM1 replyview on HN

Best to look at security policy using ecological predator-prey models. If you don't, than you fall victim to the assumption a "puzzle" you can't break is unbreakable in general.

Nuisance users don't publish CVE, and a zero trust model shows you something important. =3


Replies

Imustaskforhelptoday at 12:14 AM

Joel a little offtopic but looks like we have bumped into each other 3 times now (I remember you from VM comment and then today on a different comment and now this)

I am curious to ask now but why do you end every message with =3 & when did you start with this trend, really curious now xD

show 1 reply