Richard Blumenthal actually said...
I think this distinction is pretty simple and I think you make it in your testimony, Ms. Moussouris, when you say that we need to make clear that only 'the minimum necessary proof is required to prove that a vulnerability exists and that no further access or exploitation passed that point is authorized.'
02/05/2018