← Back to context Comment by Avamander 5 years ago That's what I'm saying kernel maintainers should figure out. 1 comment Avamander Reply michaelt 5 years ago Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
michaelt 5 years ago Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.