Security through obsolescence

Summary