Cyberoutsider ,
@Cyberoutsider@infosec.exchange avatar

@jerry Similar to Need-to-know.

No one needs to know how a system was built (that'd be a potential security weakness cause an attacker could read it to understand it, right?) - so why bother documenting anything you've done?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines