The point is that in many cases, if someone explits the "trusted" process, they already have everything that the machine is able to do anyway.

Reply via email to