top | item 21783996

(no title)

meragrin | 6 years ago

Nah, the other half just write it down on a sticky note and place it on their monitors.

discuss

order

PeterStuer|6 years ago

Which is just fine given that most threat models involve pure digital attacks.