Comment by mjevans

Comment by mjevans 3 months ago

0 replies

Any solution I can think of uses a lot of resources. Those sort of methods are useful in some contexts, such as highly secure operations, but seem very excessive for the sort of abuse and leak encountered in this example.