top | item 40458599

(no title)

Repulsion9513 | 1 year ago

Did they? IDK, just differentiating browser from curl is incredibly likely to be "good enough" as an attacker.

discuss

order

Dylan16807|1 year ago

I did have that attack in mind, yes.

But honestly it doesn't take a lot of sophistication to hide an exploit somewhere in an entire piece of software. The average person is very vulnerable to a malicious dev and the way they download is very unlikely to matter as long as it's not http://