What I find frightening is not only the risk of default but also the risk of hacking. It’s easy for someone who gain remote access to create (or remove) data, records, logs … on a system.
It’s also extremely easy for the computer owner or IT people to do the same.
It’s also extremely easy for the computer owner or IT people to do the same.