AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Do You Consider Valid Attacks That the Designers Consider?
The challenge here is that like indeed that what we have is just it's insecure by design. The question with all of this work is like, do you only consider valid attacks that the designers consider about it? Or do you think like I have my own definition of what I consider about an attack and where do you get best definition for? Initially they said like we think it's sufficient to alert the users to this. But I think going forward kind of this is going to change. They're going to fix this.