That's possible, but, it is still a vulnerability until copyright laws are abolished.

Reply to this note

Please Login to reply.

Discussion

Remove the attacker itself 😂 but we do need solutions where we can subvert them altogether.