The official document of the project should clearly specify or prove how the underlying technology addresses the most commonly known security attacks.
The official document of the project should clearly specify how the underlying technology addresses the security attacks.

Written by Sam Monac
Updated over a week ago