← Back to context Comment by Avamander 4 years ago That's what I'm saying kernel maintainers should figure out. 1 comment Avamander Reply michaelt 4 years ago Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
michaelt 4 years ago Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.
Step 1: When a malicious infiltrator is identified, mount their head on a spike as a warning to others.