Oh, and from what you pointed out, seems they are theoretically sound, and itโs more pragmatic vulnerabilities, as is always the case I suppose
always ๐
the vulnerablility is usually in the intersection of theory and actual usage
or in implementation
Please Login to reply.
No replies yet.