Comment by zelon88
10 hours ago
I thought the same thing. How white hat do you have to be to consider ineffective DRM a vulnerability?
10 hours ago
I thought the same thing. How white hat do you have to be to consider ineffective DRM a vulnerability?
No comments yet
Contribute on Hacker News ↗