• @niemcycle
    link
    English
    32 years ago

    Interesting! Goes to show, you can make something incredibly secure in its intended use, but if you don’t consider alternate ways of access, you lose all that security.