Quote:
Originally Posted by RawAlex
My opinion on this is simple: No matter what "security" features you create, some programmer with more time on their hands will develop a way to spoof the system. The more complicated the system, the more complete the spoof. I have heard about companies hiring out workers in third world contries to type "human check" boxes and such... so what can you do?
Dishonest people will try their damndest to get around your systems. It's just a fact of life.
Alex
|
Oh, it wouldn't be any kind of "fool proof" security measure

It would, though, be a great tool to add more robust backend features with.
