You are viewing a single comment's thread from:RE: Book - Securing Digital Rights for Communities | Chapter 13. Attack Vectors and What to DoView the full contextmes (72)in Network States • 6 months ago Great video! And thanks for increasing the audio volume!