| http://www.w3.org/ns/prov#value | - Your argument should be instead especially as a "security consultant to better implement the protocol chosen, not that the protocol is bad because people implement it improperly or choose poor implementations.Lets say thousands of mechanics get the same car blueprints and build the car using the exact same parts, 99% of the mechanics build a car that works beautifully and is a sight to behold, 1%
|