Comment by antihipocrat

Comment by antihipocrat 8 hours ago

0 replies

There's a third category too, users looking for security weakness and probing the system with a spectrum of inputs. The response to these inputs can reveal a lot about how the backend is designed.