Interesting! Goes to show, you can make something incredibly secure in its intended use, but if you don't consider alternate ways of access, you lose all that security.
this post was submitted on 13 Jun 2023
6 points (100.0% liked)
Infosec
208 readers
10 users here now
founded 2 years ago
MODERATORS