Remix.run Logo
pprotas 3 hours ago

Surely your claim can be backed up? Exploit code in PDFs should be obvious to point out.

qw187 3 hours ago | parent [-]

Not targeted exploits that are only served to persons of interest. The rest gets the legit version.

pprotas 3 hours ago | parent | next [-]

Yeah right, so who is the target? How do they target them? You don't even need an account for Anna's Archive, and you can download through a VPN

brookst 3 hours ago | parent | prev | next [-]

How does that work with torrents?

qw187 3 hours ago | parent [-]

Agreed, the second theory is more likely.

squarefoot 3 hours ago | parent | prev | next [-]

If you're worried about that, Dangerzone might help.

https://dangerzone.rocks/

yepyoukno 3 hours ago | parent | prev [-]

I don’t mean to validate or encourage the original point however this claim of targeted injections does have some merit.

“Yeah right, then how why or who” is complicit ignorance.

I am quite certain a covert chain of qualifiers may be achieved for targeted attacks of many varieties.

Sometimes the paranoid have a point and delusion is a matter of whose contrivances measure acceptable norms of presumption.