http://www.w3.org/ns/prov#value | - Thus a hacker could breach the security of the system by reading the authorization card to obtain the code to authorize play, i.e. enable use of a particular player, by merely reading and recording the encrypted data pertaining to that player number.
|