-
-
-
-
Replying to @ftrain
From the post-2004 machines, which this covers, not that I am aware of. But it's feasible.
2 replies 0 retweets 1 like -
Replying to @EmilyGorcenski @ftrain
The test reports also include lots of descriptors of OS versions and sometimes open source packages used.
2 replies 0 retweets 1 like -
Replying to @EmilyGorcenski
just skimming these I'm having panic attacks it's just one huge vulnerability machine
1 reply 0 retweets 1 like -
-
Replying to @EmilyGorcenski @ftrain
Did you see the parts where software cert was a linter run. And many *still* failed line length checks.
1 reply 0 retweets 0 likes -
Replying to @EmilyGorcenski @ftrain
which means they have no ci. Which means industrial fraud is entirely possible. and uncatchable.
1 reply 0 retweets 0 likes -
Replying to @EmilyGorcenski
oh I mean I just kinda expect lots of grisly tarballs getting sftped in this world, it gives me hives
1 reply 0 retweets 1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.