wtsty62 wtsty62 20-02-2024 Computers and Technology contestada As an attack, how does distributing confidential information differ from IP spoof?