security

Secrets!

3 minute read

Obfuscation, minification… why, when and (again) why?