2482
Comments (59)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
3
1776Philly 3 points ago +3 / -0

The other weak link is that a lot of "security" protocols were installed inside systems to give Certain People (TM) access of the sort they want for various reasons.

See:

PROMIS/Inslaw

Octopus and Kraken