There was also the key issue with the encryption being done client side, and the defacements.
Aren’t all “hacks” due to unforseen consequences of “designing it that way”?
(Hack implies to me using the system in a way it was not intended. )
There was also the key issue with the encryption being done client side, and the defacements.
Aren’t all “hacks” due to unforseen consequences of “designing it that way”?
(Hack implies to me using the system in a way it was not intended. )