Oh, and from what you pointed out, seems they are theoretically sound, and it’s more pragmatic vulnerabilities, as is always the case I suppose

Reply to this note

Please Login to reply.

Discussion

AzIZ

Oz

always 👍

the vulnerablility is usually in the intersection of theory and actual usage

or in implementation