(Total Views: 402)
Posted On: 06/10/2020 11:09:31 PM
Post# of 82690
If the sponsor of the call were using Endpoint Lock or a similar custom software, would that be avoided, or would it require each and every participant to be using something like Endpoint Lock? would that THEN lock the hackers out??

