Having all your code go through a multi-step process that spits out 30 different files makes it impossible to know what’s really happening, which I’m uncomfortable with.
They try, but a combination of multiple layers of work arounds used by the attackers, and a strong desire not to false positive legitimate voucher buyers means there’s always a way.
reply