36afd6ce53
Why shouldn't the least secure process be the one to verify the security?
Why shouldn't the least secure process be the one to verify the security?