• conciselyverbose@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    22 days ago

    Exactly.

    Actual security happens from the ground up. It’s the first consideration of every step of every module of code that has any interaction with user data.

    The fact that there was any version anywhere near shipping to anyone that resulted in an unsecured database being accessible to other programs tells you that it’s not possible that it’s secure.