Comment by chowells
7 months ago
No, really. I asked a specific question. What would a vulnerability that's not propaganda look like? Please explain how to distinguish between propaganda and non-popaganda vulnerabilities. I need to be able to distinguish between them for myself.
No comments yet
Contribute on Hacker News ↗