rocky_patriot

joined 1 month ago
[–] [email protected] 2 points 1 week ago (1 children)

For example: A compromised host could detect whether you are downloading the script or piping it.