Q: Could this be (ab)used by malware to also bypass such firewalls? A: Apparently yes, and trivially so. twitter
Recommended Comments