- cross-posted to:
- hackernews
- cross-posted to:
- hackernews
You must log in or register to comment.
That was an interesting read.
More W’s for security by obscurity and closed source software in general /s
That was a fun ride, and that timeline was long for mitigation.