Each and every open-source application we run here are automatically shielded against cyber attacks. This is our relationship with the white-hat community. They expect that there’s plenty of rooms for they to do penetration testing because it’s open-source.

Keyboard shortcuts

j previous speech k next speech