Defensive programming: Difference between revisions

Content deleted Content added
m The 3 Rules of Data Security: Use indented list
Line 147:
 
====The 3 Rules of Data Security====
* All [[data]] is important until proven otherwise.
* All data is tainted until proven otherwise.
* All code is insecure until proven otherwise.
 
** You cannot prove the security of any code in [[userland (computing)|userland]], or, more commonly known as: ''"never trust the client"''.
These three rules about data security describe how to handle any data, internally or externally sourced: