Protected: 10 Methods to Verify the Authenticity of a Web Browser