TempestTiger@programming.dev to Programmer Humor@programming.dev · 1 year agoCommunity Member++programming.devimagemessage-square5fedilinkarrow-up187arrow-down11
arrow-up186arrow-down1imageCommunity Member++programming.devTempestTiger@programming.dev to Programmer Humor@programming.dev · 1 year agomessage-square5fedilink
minus-squareIWriteDaCode@programming.devlinkfedilinkarrow-up2·1 year ago“Our recovery strategy is to just buy back the data from the hackers, it’s cheaper than making backups in the first place!” -This guy, probably
minus-squareTempestTiger@programming.devOPlinkfedilinkarrow-up2·1 year agoStep 1) Have terrible security. Step 2) Purposefully piss off hackers. Step 3) ??? Step 4) Profit.
“Our recovery strategy is to just buy back the data from the hackers, it’s cheaper than making backups in the first place!” -This guy, probably
Step 1) Have terrible security. Step 2) Purposefully piss off hackers. Step 3) ??? Step 4) Profit.