I found it odd how he handwaved away an entire cybersecurity sector of authentication procedures as just being "logic" and "if else statements."
I’ve never been but do a lot of Master’s thesis do hand wavy things?
Please Login to reply.
No replies yet.