Database constraints: The last line of defense | Hacker News