@TheTwelveYearOld@lemmy.world to Privacy@lemmy.mlEnglish • 7 months agoI don't know what to do with this informationlemmy.worldimagemessage-square61fedilinkarrow-up1157cross-posted to: privacy@lemmy.caprivacyguides@lemmy.oneprivacy@lemmy.world
arrow-up1157imageI don't know what to do with this informationlemmy.world@TheTwelveYearOld@lemmy.world to Privacy@lemmy.mlEnglish • 7 months agomessage-square61fedilinkcross-posted to: privacy@lemmy.caprivacyguides@lemmy.oneprivacy@lemmy.world
minus-square@MrPoopbutt@lemmy.worldlinkfedilink18•7 months agoHow would one identify which device was compromised?
minus-square@tetris11@lemmy.mllinkfedilink13•7 months agoTurn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
minus-square@Jollyllama@lemmy.worldlinkfedilink7•7 months agoInstructions unclear, I don’t speak Swahili
minus-squareEntirelyUnlovablelinkfedilink10•7 months agoWait a sec my grandmother is calling me about some pictures I apparently sent her
How would one identify which device was compromised?
Turn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
Instructions unclear, I don’t speak Swahili
Wait a sec my grandmother is calling me about some pictures I apparently sent her
deleted by creator
Assume all of them are infected.