http://www.w3.org/ns/prov#value | - Apple followers will (and already have) state that any hack on an apple device requires the users to go to a bad site to get hacked and therefore the apple device is truly hacker proof.Get real fan boys, a hack is a hack.I can use the same excuse for a XP system, but that does not fly for some reason. (1 Hidden)
|