ktemkin,
@ktemkin@chaos.social avatar

*to either coming up with a defense-in-depth strategy that assumes layers will be compromised and protects what you specifically care about

or, equally reasonably, to something else that’s more immediate and important to your project (like more commonly exploited vectors, incident recovery strategies, or just generally improving your product!)

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • DreamBathrooms
  • mdbf
  • ethstaker
  • magazineikmin
  • GTA5RPClips
  • rosin
  • thenastyranch
  • Youngstown
  • InstantRegret
  • slotface
  • osvaldo12
  • kavyap
  • khanakhh
  • Durango
  • megavids
  • everett
  • cisconetworking
  • normalnudes
  • tester
  • ngwrru68w68
  • cubers
  • modclub
  • tacticalgear
  • provamag3
  • Leos
  • anitta
  • JUstTest
  • lostlight
  • All magazines