Comment by abraae
10 days ago
The front end is in the hands of the enemy. They can do what they want with it.
The back end is not. If it falls into the hands of the enemy then it is game over.
Security-wise, it is clearly acceptable for the front end to be of lower quality than the back end.
No comments yet
Contribute on Hacker News ↗