Closed this issue 4 years ago · 1 comments
Do proper threat modelling
Completed by security assessment.