On Thursday, December 5, 2019 12:57:15 AM MST Nicolas Mailhot via devel wrote: > Let’s get real, in most businesses, the data will already be available > in a network share, a common database, etc. Trying to perform fine- > grained control checks on the mass of data businesses routinely > manipulate is a loosing game. You always end up needing to trust > humans. Let's get real. In most business, the data will also be available in a network share. Trying to perform proper separation of permissions is the appropriate method of preventing unauthorized users from gaining that data. You don't need to "trust humans", other than those who do have access to the data. > That’s even the case in ultra-secure environments like the NSA. How do > you think wikileaks happened? No. -- John M. Harris, Jr. Splentity _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx