Given this secure setup, what are some effective attacks that still are possible?
My company is developing an open-source platform that would be hosted on may different servers, deployed in the cloud by many people, that run the "LAMP" stack or something similar. My goal is to ensure that in 99.9% of cases, th… Continue reading Given this secure setup, what are some effective attacks that still are possible?