To be fair - that blog post has perhaps lost some context being posted up to an unintended audience.
Their headline on their website reads:
"Deepening the Science of Security
Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products.
We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code."
One would expect the target to whom they write their blog posts has some assumed understanding of "the science of security", and they are looking for articles which "deepen" understanding rather than explain it all from an ELI5 or completely non-understanding perspective.
(But you're right about a typically bad level of teaching and documentation in tech. I still remember struggling ~25 years ago with Perl docs which explain this using phrases like "This work just the same way as in awk"... Often things are not much better these days.)
Their headline on their website reads:
"Deepening the Science of Security Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-end security research with a real-world attacker mentality to reduce risk and fortify code."
One would expect the target to whom they write their blog posts has some assumed understanding of "the science of security", and they are looking for articles which "deepen" understanding rather than explain it all from an ELI5 or completely non-understanding perspective.
(But you're right about a typically bad level of teaching and documentation in tech. I still remember struggling ~25 years ago with Perl docs which explain this using phrases like "This work just the same way as in awk"... Often things are not much better these days.)