How is that information provided to the user, and can it be faked? I legitimately don’t know enough about how the protocol works.
Login to reply
Replies (1)
I AM IN THE SAME BOAT…NOT SURE HOW…BUT AGAIN…ITS JUST CODE AND WE CAN MAKE IT WHAT WE WANT :)