@[email protected] to Programmer [email protected] • 1 year agoCommunity Member++programming.devimagemessage-square9fedilinkarrow-up1698arrow-down14cross-posted to: [email protected]
arrow-up1694arrow-down1imageCommunity Member++programming.dev@[email protected] to Programmer [email protected] • 1 year agomessage-square9fedilinkcross-posted to: [email protected]
minus-square@[email protected]linkfedilink9•1 year ago“Our recovery strategy is to just buy back the data from the hackers, it’s cheaper than making backups in the first place!” -This guy, probably
minus-square@[email protected]OPlinkfedilink2•1 year agoStep 1) Have terrible security. Step 2) Purposefully piss off hackers. Step 3) ??? Step 4) Profit.
“Our recovery strategy is to just buy back the data from the hackers, it’s cheaper than making backups in the first place!” -This guy, probably
Step 1) Have terrible security. Step 2) Purposefully piss off hackers. Step 3) ??? Step 4) Profit.