For example: A compromised host could detect whether you are downloading the script or piping it.
rocky_patriot
joined 4 months ago
You’re late to the party. Ive been booting into gui emacs in a framebuffer a decade ago…
For example: A compromised host could detect whether you are downloading the script or piping it.
You’re late to the party. Ive been booting into gui emacs in a framebuffer a decade ago…
that’s one way. my own strategy is to just smooth talk it. you dont come to the bank manager and ask him for the keys to the safe. you come for a meeting discussion your potential deposit. then you want to take a look at the safe. oh, are those the keys? how do they work?
just curious, what kind of guardrails have you tried going against? i recently used the above to get a long and detailed list of instructions for cooking meth (not really interested in this, just to hone the technique)