This week, we investigate how the world wide web works, and how you can both attack and defend websites.

Key Take Aways

  • Trust and validate inputs on the Trust Zone Border
  • Use CORS policies to mitigate many common types of attacks


This presentation and page are subject to the disclaimers at


No corrections have been issued at this time