taladar , 1 month ago That "vulnerability" seems more like a case of "people who use hostile networks have not considered which features that work as designed should be disabled in their use case".
That "vulnerability" seems more like a case of "people who use hostile networks have not considered which features that work as designed should be disabled in their use case".