- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
You must log in or # to comment.
More W’s for security by obscurity and closed source software in general /s
That was an interesting read.
That mitigation timeline is brutal.
That was a fun ride, and that timeline was long for mitigation.