← Back to context Comment by pprotas 8 hours ago Surely your claim can be backed up? Exploit code in PDFs should be obvious to point out. 6 comments pprotas Reply qw187 8 hours ago Not targeted exploits that are only served to persons of interest. The rest gets the legit version. pprotas 8 hours ago Yeah right, so who is the target? How do they target them? You don't even need an account for Anna's Archive, and you can download through a VPN brookst 8 hours ago How does that work with torrents? qw187 8 hours ago Agreed, the second theory is more likely. squarefoot 8 hours ago If you're worried about that, Dangerzone might help.https://dangerzone.rocks/ yepyoukno 7 hours ago I don’t mean to validate or encourage the original point however this claim of targeted injections does have some merit.“Yeah right, then how why or who” is complicit ignorance.I am quite certain a covert chain of qualifiers may be achieved for targeted attacks of many varieties.Sometimes the paranoid have a point and delusion is a matter of whose contrivances measure acceptable norms of presumption.
qw187 8 hours ago Not targeted exploits that are only served to persons of interest. The rest gets the legit version. pprotas 8 hours ago Yeah right, so who is the target? How do they target them? You don't even need an account for Anna's Archive, and you can download through a VPN brookst 8 hours ago How does that work with torrents? qw187 8 hours ago Agreed, the second theory is more likely. squarefoot 8 hours ago If you're worried about that, Dangerzone might help.https://dangerzone.rocks/ yepyoukno 7 hours ago I don’t mean to validate or encourage the original point however this claim of targeted injections does have some merit.“Yeah right, then how why or who” is complicit ignorance.I am quite certain a covert chain of qualifiers may be achieved for targeted attacks of many varieties.Sometimes the paranoid have a point and delusion is a matter of whose contrivances measure acceptable norms of presumption.
pprotas 8 hours ago Yeah right, so who is the target? How do they target them? You don't even need an account for Anna's Archive, and you can download through a VPN
brookst 8 hours ago How does that work with torrents? qw187 8 hours ago Agreed, the second theory is more likely.
yepyoukno 7 hours ago I don’t mean to validate or encourage the original point however this claim of targeted injections does have some merit.“Yeah right, then how why or who” is complicit ignorance.I am quite certain a covert chain of qualifiers may be achieved for targeted attacks of many varieties.Sometimes the paranoid have a point and delusion is a matter of whose contrivances measure acceptable norms of presumption.
Not targeted exploits that are only served to persons of interest. The rest gets the legit version.
Yeah right, so who is the target? How do they target them? You don't even need an account for Anna's Archive, and you can download through a VPN
How does that work with torrents?
Agreed, the second theory is more likely.
If you're worried about that, Dangerzone might help.
https://dangerzone.rocks/
I don’t mean to validate or encourage the original point however this claim of targeted injections does have some merit.
“Yeah right, then how why or who” is complicit ignorance.
I am quite certain a covert chain of qualifiers may be achieved for targeted attacks of many varieties.
Sometimes the paranoid have a point and delusion is a matter of whose contrivances measure acceptable norms of presumption.