by Carlota Gómez 3 years ago
160
More like this
by Meredith Gore
by luis brayan tandayamo imbaquingo
by Max Meints
by Dustin Cerda
communication protocol is encrypted
read by an attacker
remember pieces of information
to know whether the user is logged in or not