

That is not an answer.
Here’s a simple way to look at it
I’m not looking for a simple way to look at it. I want a technical breakdown of why rebuilding back end instances is valuable in a security context.
- When do the rebuilds occur? Are they triggered by some event?
- what happens to session tokens?
- do you have frontend / backend auth? What happens to that?
- are you rotating secrets as well? Compromised back end would imply your secrets can no longer be trusted.
- is data encrypted in massive blobs, or can one request only blocks of data?
- can the app tune storage requirements depending on S3 configuration?
I’ll be blunt with you: your answers to this and others have been very surface-level and scant on technical details, which gives a strong impression that you don’t actually know how this thing works.
You are responsible for your output. If you want chatgpt or github ai tools to help you, that’s fine, but you still need to understand how the whole thing works.
You are making something “secure”, you need to be able to explain how that security works.


Thanks for the reply.