It’s basically impossible to talk about how to secure a computer system (or how to gain covert access to one) without talking about which account has which privilege, let along things like how to ensure an unbiased random number generator, or do an analysis of who has what without looking at an intersection of sets.

  • @RaoulDook
    link
    English
    184 days ago

    Yo dawg I heard you liked 1984 so we 1984’d your mass surveillance agency