Closed PieterKas closed 1 week ago
Clarifying the text to make it clear that there are two ways in which phishing attacks may be facilitated by this specification. (see issue #81)
cc @yaronf
Clarifying the text to make it clear that there are two ways in which phishing attacks may be facilitated by this specification. (see issue #81)
cc @yaronf