Don't really need comments, and it's a hastle from a security (SRI/CSP) and privacy point of view.dev
|
||
16 | 16 |
|
17 | 17 |
|
18 | 18 |
|
19 |
|
|
20 |
|
|
||
8 | 8 |
|
9 | 9 |
|
10 | 10 |
|
11 |
|
|
12 |
|
|
||
1 |
|
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
|
|
7 |
|
|
8 |
|
|
9 |
|
|
10 |
|
|
11 |
|
|
12 |
|
|
13 |
|
|
||
11 | 11 |
|
12 | 12 |
|
13 | 13 |
|
14 |
|
|
15 | 14 |
|
16 | 15 |
|
17 | 16 |
|
18 | 17 |
|
19 | 18 |
|
20 | 19 |
|
21 |
|
|
22 |
|
|
||
305 | 305 |
|
306 | 306 |
|
307 | 307 |
|
308 |
|
|
308 |
|
|
309 | 309 |
|
310 | 310 |
|
311 | 311 |
|