This is a first-pass at adding a lightweight "security and abuse" section to our service documentation. This should explain some of the things that we do to ensure that our hubs are secure and that they aren't vulnerable to abuse.
As a start, I listed three things here, but I'd love suggestions on other major security items I can mention in addition to this.
This is a first-pass at adding a lightweight "security and abuse" section to our service documentation. This should explain some of the things that we do to ensure that our hubs are secure and that they aren't vulnerable to abuse.
As a start, I listed three things here, but I'd love suggestions on other major security items I can mention in addition to this.