0
Reply

How would you perform a cryptographic audit of an application?