@[email protected] to [email protected]English • 3 months agoI don't know what to do with this informationlemmy.worldimagemessage-square61fedilinkarrow-up1160arrow-down16cross-posted to: [email protected][email protected][email protected]
arrow-up1154arrow-down1imageI don't know what to do with this informationlemmy.world@[email protected] to [email protected]English • 3 months agomessage-square61fedilinkcross-posted to: [email protected][email protected][email protected]
minus-square@[email protected]linkfedilink20•3 months agoHow would one identify which device was compromised?
minus-square@[email protected]linkfedilink12•3 months agoTurn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
minus-squareEntirelyUnlovablelinkfedilink11•3 months agoWait a sec my grandmother is calling me about some pictures I apparently sent her
How would one identify which device was compromised?
Assume all of them are infected.
Turn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
Wait a sec my grandmother is calling me about some pictures I apparently sent her
Instructions unclear, I don’t speak Swahili
deleted by creator