• PoolloverNathan
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 hours ago

    (to make the joke more obvious)

    The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.