The attackers have to own a stake in the system, which counters the potential problem to some degree.
You are viewing a single comment's thread from:
The attackers have to own a stake in the system, which counters the potential problem to some degree.