Content deleted Content added
mNo edit summary |
"Encrypt" -> "Encrypt/authenticate" |
||
Line 12:
* Either leave the code available to everyone on the Net (see [[Free software]] or [[Open Source Definition]]) or hire someone who will perform a software [[security audit]].
* If possible, reuse code instead of writing from scratch.
* Encrypt/authenticate all important data transmitted over networks. Do not attempt to implement your own encryption scheme, but use a proven one instead.
* All data is important until proven otherwise.
* All code is insecure until proven otherwise.
|