Comment by zelon88
12 hours ago
I thought the same thing. How white hat do you have to be to consider ineffective DRM a vulnerability?
12 hours ago
I thought the same thing. How white hat do you have to be to consider ineffective DRM a vulnerability?
No comments yet
Contribute on Hacker News ↗