Well if it requires tampering with the software to do the insecure thing, then it’s presumably your company has a contract in place saying that if they get hacked it’s on them. That doesn’t strike me as just being retarded security theater.
Well if it requires tampering with the software to do the insecure thing, then it’s presumably your company has a contract in place saying that if they get hacked it’s on them. That doesn’t strike me as just being retarded security theater.