found on GIF Trunk |
Whether this is good or bad really depends on your threat model. If you don't consider models a threat then their ability to bypass your security isn't a problem. On the other hand, if this is a model threat, then you've got problems.
0 comments:
Post a Comment