Discussion about this post

User's avatar
Qingsong Yao's avatar

If hacker are using randomly generated key, cache with null value will still have the same issue.

Manh Phan's avatar

Sometimes, I see it can be called caching penetration.

1 more comment...

No posts

Ready for more?