What do we get?
Who is in charge of protecting the users of a publicly-available application from abuse?
Previous slide
Next slide
Back to first slide
View graphic version