Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)EN
Posts
0
Comments
495
Joined
1 yr. ago

Permanently Deleted

Jump
  • I was reading someone else's explanation and they said it's the equivalent of every computer possibly having a backdoor because there is code in a computer that a bad actor can use. There are extra commands that could possibly be used for a backdoor if a malicious actor found a way to use those bits of code. It's much less oh here is a security vulnerability that is being used and more of a if a robber breaks into our house which is possible they will rob us situation.

  • I have gone to a couple lava flow caves and went to one in Central Oregon that I had to crawl through a tiny hole for about 5-6 feet not too bad but it opened up to this amazing little geode room thing...out of the ten of us only 4 of us went in there it was terrifying but worth it...turning off your flashlights in caves is something else!!!