• she/they

pdx queer dev, now an Old


There are entire classes of software vulnerability that, I am sorry, I simply refuse to acknowledge as real.

Anything that starts with "you are exploiting something else" is just bullshit, I'm sorry, like, ah, someone got elevated permissions and can use those to do... The things this software can do? It's just malicious use not an exploit in the other thing!


You must log in to comment.