It's always the way with a good protocol. First you connect it, then you protect it. We are in that stage where the second step starts.
It's always the way with a good protocol. First you connect it, then you protect it. We are in that stage where the second step starts.
No replies yet.