How is that information provided to the user, and can it be faked? I legitimately don’t know enough about how the protocol works.
Discussion
I AM IN THE SAME BOAT…NOT SURE HOW…BUT AGAIN…ITS JUST CODE AND WE CAN MAKE IT WHAT WE WANT :)
How is that information provided to the user, and can it be faked? I legitimately don’t know enough about how the protocol works.
I AM IN THE SAME BOAT…NOT SURE HOW…BUT AGAIN…ITS JUST CODE AND WE CAN MAKE IT WHAT WE WANT :)