• MrPoopbutt
    link
    fedilink
    arrow-up
    18
    ·
    2 months ago

    How would one identify which device was compromised?

    • tetris11@lemmy.ml
      link
      fedilink
      arrow-up
      13
      arrow-down
      2
      ·
      2 months ago

      Turn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine