Understood, but IMO we're not there...yet. No system is impenetrable. Find the vulnerability, penetrate it, and when the time is right...deploy the payload ;)

Reply to this note

Please Login to reply.

Discussion

No replies yet.