top | item 37796664

(no title)

elesiuta | 2 years ago

I think this is still reasonable, attackers may have a database of leaked keys (e.g. if you ever accidentally commited to GitHub, or ever ran a malicious script which uploaded it), which they then try on random servers.

discuss

order

No comments yet.