rocky_patriot

joined 1 month ago
[–] rocky_patriot@programming.dev 2 points 18 hours ago (1 children)

For example: A compromised host could detect whether you are downloading the script or piping it.