>Q uses multiple IPs and devices which must each be verified
Sorry this bothers me, why can't this be automated in code? devices which must each be verified, what their IP's, their MAC addresses, their trips, …. and from every device right?
>Q uses multiple IPs and devices which must each be verified
Sorry this bothers me, why can't this be automated in code? devices which must each be verified, what their IP's, their MAC addresses, their trips, …. and from every device right?
That seems correct but does Jim know all the info? Did they program the security or download someone else's code?
This is so confusing. How can USSS, NSA, and DHS protect the message unless the trips are coming from all 3?