On Mar 29, 2:03 pm, jOHN Steven <
m1spl4c3ds...@gmail.com> wrote:
> As you "move to mobile", the first step in updating your threat model
> is identifying "who" can attack you. @_krypto_ and I collaborated on a
> blog post to illuminate some of the new attackers... ...as well as how
> this architectural addition can breathe new life into some of the old
> attackers. Check out:
>