← Back to context Comment by yjftsjthsd-h 4 years ago > Update the processes and tools to try and catch such malicious infiltrators.How? 2 comments yjftsjthsd-h Reply Avamander 4 years ago That's what I'm saying kernel maintainers should figure out. michaelt 4 years ago Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
Avamander 4 years ago That's what I'm saying kernel maintainers should figure out. michaelt 4 years ago Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
michaelt 4 years ago Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
That's what I'm saying kernel maintainers should figure out.
Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.