How to build a security data pipeline (and why you shouldn't) | Dark Hacker News