• JasonDJ@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      5 months ago

      Usually a deny-list or a block-list.

      These are the inclusive terms that are getting adopted in IT, at least, and they usually work in that context. Maybe not for everything.

        • quaternaut@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          5 months ago

          At my company, white hat hackers are to be called “offensive security researchers”. Black hat hackers are to be called “attackers”.