George Capehart wrote:
Yvan Boily wrote:

Hi George,

I think a much more eloquent form of what you are saying is that
validation must be performed each time data crosses a security
boundary.


Hello Yvan,

I absolutely agree.  Wish I'd said it myself . . .  :)

In other words, it's just Javascript. Do your coding securely. I don't like the big buzz. This is nothing new.


The challenge is in helping people to understand what a security boundary is.


Errrmmmmmm.  Into understatement these days, eh?  :)

I wish I had a good Yoda quote right now, but all I can come up with is Terry Goodkind, which I feel very ashamed of.

        Gadi.

--
http://blogs.securiteam.com/

"Out of the box is where I live".
        -- Cara "Starbuck" Thrace, Battlestar Galactica.
_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to