• douglasg14b@lemmy.world
    link
    fedilink
    arrow-up
    2
    arrow-down
    3
    ·
    3 days ago

    Counter argument is that error codes and problem details can be used by attackers to reverse engineer and find exploitable parts of a system.

    Within reason anyways