

3·
1 year agoif the value of the compromised data exceeds the value of the drive, destroy the drive.
Your friendly local involuntary-brain-transplant victim.
All content produced on open-source hardware and software.
if the value of the compromised data exceeds the value of the drive, destroy the drive.
@pro3757 @petsoi can confirm, croc is awesome.
you can even use your own infrastructure as the midpoint.