| http://www.w3.org/ns/prov#value | - However, the time before an operating system has loaded is particularly vulnerable to attack, since the infrastructure that protects the operating system from attacks may not have been established yet (or may be in the process of being established).
|