this post was submitted on 13 Jun 2023
6 points (100.0% liked)
Infosec
208 readers
10 users here now
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Interesting! Goes to show, you can make something incredibly secure in its intended use, but if you don't consider alternate ways of access, you lose all that security.