P.S : Any sensitive bits commited are dead and not used in anything public - don't get all excitable now.
From time to time I give talks on a range of information security and privacy issues, you can find my slides and what not here
A handy collection of my publications and whitepapers.
Head over to GitHub to check out what I am currently working on.
|Copyright - Scott Adams (http://www.dilbert.com/)|
If your application has just 7 customisable options to change the authentication or business logic flow... that's 5040 distinct permutations....each creating a different attack surface. Still think adding a new technical configuration option is a minor change?
Stop trying to climb the mountain in one day if walking to the end of your garden will take a week.
The is no such thing as perfectly secure unless you are willing to stop doing business.
End everyday with an application that is more secure than it was yesterday