@TheTwelveYearOld to [email protected]English • 1 month agoI don't know what to do with this informationimagemessage-square65arrow-up1161arrow-down16cross-posted to: [email protected]privacy[email protected]
arrow-up1155arrow-down1imageI don't know what to do with this information@TheTwelveYearOld to [email protected]English • 1 month agomessage-square65cross-posted to: [email protected]privacy[email protected]
minus-square@[email protected]linkfedilink11•1 month agoTurn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
minus-squareEntirelyUnlovablelink10•1 month agoWait a sec my grandmother is calling me about some pictures I apparently sent her
How would one identify which device was compromised?
Assume all of them are infected.
Turn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
Wait a sec my grandmother is calling me about some pictures I apparently sent her
Instructions unclear, I don’t speak Swahili
That advice is a bit too weird;)