"The machine naturally does the bidding of the user, not the owner. When you get compromised, the user changes. Want to defend an ostensibly
-
-
-
single-user system from an unexpected and unwanted new user? Congratulations: you're building DRM."
- 1 more reply
New conversation -
-
-
@newshtwit
@patio11@dinodaizovi I’m surprised you disagree /cc@rootlabs -
@tqbf @newshtwit@patio11@dinodaizovi Rand heap? Canaries? All first used to prevent direct tampering via debugger. - 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.