"Insecure" reads better. For accuracy.
Let's say that there are two remote servers with a remotely-exploitable memory corruption vulnerability. Server 1: Known software on known OS version Server 2: Custom software on custom OS. I assert that server #1 is more likely to be exploited. So #2 is more secure, perhaps?
-
-
This Tweet is unavailable.
-
Unsubscribe. It’s almost 2020.
End of conversation
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
