I found it odd how he handwaved away an entire cybersecurity sector of authentication procedures as just being "logic" and "if else statements."
I found it odd how he handwaved away an entire cybersecurity sector of authentication procedures as just being "logic" and "if else statements."
I’ve never been but do a lot of Master’s thesis do hand wavy things?