Stupid question: For those freaking out about Apple's CSAM scanning from a slippery slope argument, why isn't there the same argument about antivirus scanning? Especially when most AV systems have cloud-based uploading facilities for suspicious but not certain files?
-
-
here is a very basic tracer of secure kernel transitions https://pastebin.com/raw/DmGmL6eu
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Then how do you know?
-
look i even posted code to do it
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.