Should be a given that once the company dissolves the rights become open
Is there a write up for the Lemmy exploit that happened? Or can someone give me any specific? I’m a cybersecurity student and would like to learn a bit more.
EDIT: Awesome, thanks for the links guys!
Should be a given that once the company dissolves the rights become open