> Hackers exploit flawed proprietary code.
(6w/45c -> 5w/40c)
> Proprietary code hack.
(6w/45c -> 3w/22c: >50%)
Proprietary hack
2w/15c
1w/5c