A client of mine said that he was concerned with Mach-ii because he was worried about implicit invocation security concerns. I've searched around but I haven't been able to get much information about implicit invocation and security and nothing about Mach-ii security concerns. How do I reply to his query in a way that will make him confident in the framework?

Reply via email to