| ▲ | ArcHound 3 days ago | |
I love to see this. As much as we try for simple security principles, the damn things have a way to become complicated quickly. Perhaps the diagram highlights the common risky parts of these apps and we gain more risk as we keep increasing the scope? Maybe we can do some handovers and protocols to separate these concerns? | ||