? You may have misunderstood, what we stated was not really a "position" or opinion. If the user is free to update the data even after concurrent modification has been detected, then it's not important if the user is spoofing oldValues. He can already do what he wants to do without spoofing.
Thanks for the test case, we'll take a look.
Thanks for the test case, we'll take a look.
Comment