btw, I'm not here to start name calling. I'd like to understand your technical criticisms as objectively as I can. so don't start it.
if vulnerability exists then it should be exploitable. i.e. http://monerolink.com
-
-
Look, you clearly have no idea how to think adversarially, but that is simply not the case. See, for eg. https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/ …
-
um, don’t change the subject. we’re talking about
#PrivateSend. -
I'm not changing the subject, I'm showing you an example of a weakness where the impact remains unknown.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.