2e45949e0c
Why shouldn't the least secure process be the one to verify the security?
Why shouldn't the least secure process be the one to verify the security?