• conciselyverbose@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      Exactly.

      Actual security happens from the ground up. It’s the first consideration of every step of every module of code that has any interaction with user data.

      The fact that there was any version anywhere near shipping to anyone that resulted in an unsecured database being accessible to other programs tells you that it’s not possible that it’s secure.