All those solutions are broken from the security perspective. Those solutions provide only an ilusion of security but there is no security behind them at all. I will try to proof it using some simple examples.
I want emphesis that I'm not a security expert. I'm a softawre architect with a quite big experience in IT.
My main goal is to share my findings and my knowledge regarding IT systems and security.
If you find any mistakes in my reasoning that's greate - please let me know about it - I am open to criticism.
I want emphesis that I'm not a security expert. I'm a softawre architect with a quite big experience in IT.
My main goal is to share my findings and my knowledge regarding IT systems and security.
If you find any mistakes in my reasoning that's greate - please let me know about it - I am open to criticism.
No comments:
Post a Comment