Quote Originally Posted by Svpernova09 View Post
You are comparing apples with tomatoes, since according to that article you need a working user account to exploit the bug. 'foolproof & 100% are your words. Don't think anyone with common sense is gonna state that something that is made by humans can ever be 100% foolproof. But it's pretty clear that both operating systems play in a different league, one in the secure league, and another one in the insecure league. You blame him for not having an authenticator, by that same logic i blame him for not having a secure OS.