|
| ▲ | pprotas 3 hours ago | parent | next [-] |
| Yeah right, so who is the target? How do they target them? You don't even need an account for Anna's Archive, and you can download through a VPN |
|
| ▲ | brookst 3 hours ago | parent | prev | next [-] |
| How does that work with torrents? |
| |
|
| ▲ | squarefoot 3 hours ago | parent | prev | next [-] |
| If you're worried about that, Dangerzone might help. https://dangerzone.rocks/ |
|
| ▲ | yepyoukno 3 hours ago | parent | prev [-] |
| I don’t mean to validate or encourage the original point however this claim of targeted injections does have some merit. “Yeah right, then how why or who” is complicit ignorance. I am quite certain a covert chain of qualifiers may be achieved for targeted attacks of many varieties. Sometimes the paranoid have a point and delusion is a matter of whose contrivances measure acceptable norms of presumption. |