| ▲ | sandermvanvliet 6 hours ago | |
If you think about this in the context of systems that ingest content from third party systems then this attack becomes more feasible. But then, if you’re inside the network you’ve already overcome many of the boundaries | ||