this post was submitted on 11 Nov 2025
634 points (98.6% liked)

Programmer Humor

27412 readers
2037 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] themaninblack@lemmy.world 2 points 1 week ago (1 children)

Dude thank you for your detailed reply which I have been thinking about for a while.

I don’t want to mischaracterise what you’re saying but I want to try to summarise the lessons, which I think are super valid.

  1. Some external layers or services are basically essential, like a WAF/auth/rate limiter/API gateway/reverse proxy. Or DB.
  2. Observability and logging, and rapid response to anomalies, together with a honeypot, go a long way toward maintaining security.

This is definitely a way to think about this that I haven’t distilled. Thanks!

[–] adminofoz@lemmy.cafe 3 points 1 week ago* (last edited 1 week ago)

Thanks! Glad it was helpful. I didnt have any similar realization until I had worked in the field for awhile amd honestly didnt have anyone to tell so i probably rambled. Good summary. Lean more into WAF, EDR and observability before a honeypot but yeah both are valid.

Hope your talk goes well!