<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[nuintari&#x27;s rules of networking 0x2f:]]></title><description><![CDATA[<p>nuintari's rules of networking 0x2f:</p><p>Defense in depth is dead, long live defense in depth!</p><p>Seriously, the alternative is to expect your single line of defense to be perfect, and that has worked sooooo well so far.</p>]]></description><link>https://board.circlewithadot.net/topic/f53eba27-ab85-4912-99b8-9409769b1db0/nuintari-s-rules-of-networking-0x2f</link><generator>RSS for Node</generator><lastBuildDate>Fri, 01 May 2026 03:01:04 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/f53eba27-ab85-4912-99b8-9409769b1db0.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 15 Apr 2026 13:07:00 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to nuintari&#x27;s rules of networking 0x2f: on Wed, 15 Apr 2026 13:19:40 GMT]]></title><description><![CDATA[<p><span><a href="/user/nuintari%40mastodon.bsd.cafe">@<span>nuintari</span></a></span> do submariners use “defense in the depth”?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/fbarton/statuses/116408921648729770</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/fbarton/statuses/116408921648729770</guid><dc:creator><![CDATA[fbarton@infosec.exchange]]></dc:creator><pubDate>Wed, 15 Apr 2026 13:19:40 GMT</pubDate></item></channel></rss>