Closed TheAngryByrd closed 5 years ago
For example, how do we determine if "Nothing" is not some kind of "Onion Nothing", with other, less benign Nothings hidden inside?
At the very minimum there needs to be a threat modeling diagram for every conceivable deployment scenario (even more so for the inconceivable ones).
@TheAngryByrd I'm not seeing your review and am exceedingly concerned for either you or this project. If this is a dead-mans switch, please indicate so by not replying.
We need to make sure this gets a security review. With this recent events in the news, we need to be confident that this won't allow attackers to gain access from an exploit. My company won't allow any code that hasn't been thoroughly reviewed.