We know that HTML5 is a written language and that everything that is written is displayed to the customer. Thinking this way, we know that today we unfortunately have several visitors to xat.com malicious and fraudulent. Therefore, we know that if a script is not implemented in which the SELECT ELEMENT is self-blocked by the customer, several frauds may occur ; Prints of lying accusations; Delude a new xat.com registrant by demonstrating xats and days that never existed, but that the INSPECTING ELEMENT makes it possible to have. Besides, I can pose as someone else, call a DIV or a CLASS where you call the power RUBY or the power EVERYPOWER, why not? The Inspect element lets me do what I want, doesn't it? Everything FRONT makes it possible for me to modify, xat size; letters size etc. I believe this is not a BUG, but here's the tip for ADMINISTRATION and also for xat.COM Volunteers regarding this small or BIG problem. Do not believe the prints by html5, everything can be a scam. The html5 is beautiful and even taking xat.com to the html5 is even more beautiful, it is brilliant, but you will need to improve security in this regard, considering that, FRAUD will happen and will actually happen.
Foto original x Inspecionar Elemento
Img1
Only 1 image to demonstrate the problem.
Recommended Comments