| ▲ | qw187 3 hours ago | |||||||
Not targeted exploits that are only served to persons of interest. The rest gets the legit version. | ||||||||
| ▲ | pprotas 3 hours ago | parent | next [-] | |||||||
Yeah right, so who is the target? How do they target them? You don't even need an account for Anna's Archive, and you can download through a VPN | ||||||||
| ▲ | brookst 3 hours ago | parent | prev | next [-] | |||||||
How does that work with torrents? | ||||||||
| ||||||||
| ▲ | squarefoot 3 hours ago | parent | prev | next [-] | |||||||
If you're worried about that, Dangerzone might help. | ||||||||
| ▲ | yepyoukno 3 hours ago | parent | prev [-] | |||||||
I don’t mean to validate or encourage the original point however this claim of targeted injections does have some merit. “Yeah right, then how why or who” is complicit ignorance. I am quite certain a covert chain of qualifiers may be achieved for targeted attacks of many varieties. Sometimes the paranoid have a point and delusion is a matter of whose contrivances measure acceptable norms of presumption. | ||||||||