Oddbean new post about | logout
 Correct.. no matter how you try to encode logical constraints to achieve security in software, no amount of logic can prevent the exploitation of logic.