AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
What Kind of Security Does a Graph Kill System Use?
Graph kill uses two verbs: queries and mutations. It's very different from HTTP people, you have just these two simple verbs. This is a little obscure. Very convenient. What kind of security does a graph kill system use? Like, how do you lock it down? Is it just using Jot or, like, something like that? Yes.