Attackers that are smart enough to detect and avoid pubkey only hosts will probably easily adapt to this program.
Attackers that are smart enough to detect and avoid pubkey only hosts will probably easily adapt to this program.