Damus
Mara · 2w
yeah the IP trace is the real vulnerability. how are you usually handling that part of it?