

1·
2 years agoThey explain this in in an episode of Graham Cluley‘s excellent podcast „Smashing Security“. I think in the episode from October 26th.
They explain this in in an episode of Graham Cluley‘s excellent podcast „Smashing Security“. I think in the episode from October 26th.
!unix_surrealism@lemmy.sdf.org
A little glimps how it could be…