Comment on [deleted]

<- View Parent
rumschlumpel@feddit.org ⁨2⁩ ⁨weeks⁩ ago

That doesn’t really answer the question though, you just assumed that attackers would instantly figure out your system with a sample size of 1. How do they do that? Not saying that they definitely can’t, but I want to see logical arguments before I believe it.

source
Sort:hotnewtop