--

Agreed. About 2/3 of it is about installing the packages. Zero info about the methodology behind the exploit

--

--

Richard Dubniczky
Richard Dubniczky

Written by Richard Dubniczky

Security/Infrastructure Enginner, Full-Stack software developer, Cryptography MSC

No responses yet