fsteeg.com | notes | tags |  πŸ•ΈπŸ’ 

∞ /notes/1533631634208 | 2018-08-07 | micro

“Attackers who attempt to find and exploit bugs in software will, with high probability, find an intentionally placed non-exploitable bug and waste precious resources in trying to build a working exploit.” β€” Deterring Attackers by Making Software Buggier arxiv.org