(Total Views: 384)
Posted On: 06/10/2020 11:09:31 PM
Post# of 82677
If the sponsor of the call were using Endpoint Lock or a similar custom software, would that be avoided, or would it require each and every participant to be using something like Endpoint Lock? would that THEN lock the hackers out??
![](/m/images/thumb-up.png)
![](/m/images/thumb-down.png)
Scroll down for more posts ▼