@neurovagrant@masto.deoan.org
i mean who could've expected a yearslong, deeply researched, regularly used method of data exfiltration COULD BE ABUSED BY REMOVING NECESSARY USER INTERACTION
@cR0w@infosec.exchange
i mean who could've expected a yearslong, deeply researched, regularly used method of data exfiltration COULD BE ABUSED BY REMOVING NECESSARY USER INTERACTION
@cR0w@infosec.exchange @neurovagrant@masto.deoan.org I'm shocked.. SHOCKED I tell you! Well not that shocked.