
Just goes to show...
That code from "trusted" suppliers can be as/more dangerous than that from else where that has been subjected to independent scrutiny by the security services.
Still, they can be trusted in the core network...
That code from "trusted" suppliers can be as/more dangerous than that from else where that has been subjected to independent scrutiny by the security services.
Still, they can be trusted in the core network...