We're too lazy to install real blog software and don't believe in the "cloud", so this page will serve as a focal point for offering our comments and rebuttal to various security related blogs, articles or tweets that demand more than a 140 character response. Please read the original article being rebutted to understand the author's point of view. These replies are not (typically) meant to be a "you are wrong, we are right", rather to add perspective and commentary. Or the replies may make personal or ad hominem attacks, because we're selectively juvenile and immature.