You must log in or register to comment.
Ah yes, the hostile architecture approach.
In IT, sometimes there’s security reasons for the designed detour.
But then good design would completely obstruct the shortcut from the user’s view.
Ah yes, the hostile architecture approach.
In IT, sometimes there’s security reasons for the designed detour.
But then good design would completely obstruct the shortcut from the user’s view.