@[email protected] to Programmer [email protected] • 2 years agoCommunity Member++programming.devimagemessage-square9fedilinkarrow-up1698arrow-down14cross-posted to: [email protected]
arrow-up1694arrow-down1imageCommunity Member++programming.dev@[email protected] to Programmer [email protected] • 2 years agomessage-square9fedilinkcross-posted to: [email protected]
minus-square@[email protected]linkfedilink9•2 years ago“Our recovery strategy is to just buy back the data from the hackers, it’s cheaper than making backups in the first place!” -This guy, probably
minus-square@[email protected]OPlinkfedilink2•2 years agoStep 1) Have terrible security. Step 2) Purposefully piss off hackers. Step 3) ??? Step 4) Profit.
“Our recovery strategy is to just buy back the data from the hackers, it’s cheaper than making backups in the first place!” -This guy, probably
Step 1) Have terrible security. Step 2) Purposefully piss off hackers. Step 3) ??? Step 4) Profit.