You happen to be on stage re: data leakage and this should be an important thought for any person rolling their own individual authentication/authorization plan. +one for mentioning OWASP. As with the expanding AI assault surface area, the increasing adoption of AI applications offers hackers extra ways to harm enterprises http://pigpgs.com