this post was submitted on 13 Jun 2023
6 points (100.0% liked)

Infosec

208 readers
10 users here now

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] niemcycle 3 points 2 years ago

Interesting! Goes to show, you can make something incredibly secure in its intended use, but if you don't consider alternate ways of access, you lose all that security.