• JasonDJ@lemmy.zip
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    5 months ago

    Usually a deny-list or a block-list.

    These are the inclusive terms that are getting adopted in IT, at least, and they usually work in that context. Maybe not for everything.

      • quaternaut@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        5 months ago

        At my company, white hat hackers are to be called “offensive security researchers”. Black hat hackers are to be called “attackers”.