← Back to context

Comment by Joel_Mckay

10 hours ago

Best to look at security policy using ecological predator-prey models. If you don't, than you fall victim to the assumption a "puzzle" you can't break is unbreakable in general.

Nuisance users don't publish CVE, and a zero trust model shows you something important. =3

Joel a little offtopic but looks like we have bumped into each other 3 times now (I remember you from VM comment and then today on a different comment and now this)

I am curious to ask now but why do you end every message with =3 & when did you start with this trend, really curious now xD