..
Planning security
- Never underestimate the influence of security issues.
- Assume that the execution environment is compromised.
- Use encryption for all external communications.
- Verify the input in all externally visible APIs.