← Back to context Comment by zelon88 8 hours ago I thought the same thing. How white hat do you have to be to consider ineffective DRM a vulnerability? 0 comments zelon88 Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗