TheTwelveYearOld@lemmy.world to Privacy@lemmy.mlEnglish · 2 days agoI don't know what to do with this informationlemmy.worldimagemessage-square46fedilinkarrow-up1152cross-posted to: privacyguides@lemmy.oneprivacy@lemmy.worldprivacy@lemmy.ca
arrow-up1152imageI don't know what to do with this informationlemmy.worldTheTwelveYearOld@lemmy.world to Privacy@lemmy.mlEnglish · 2 days agomessage-square46fedilinkcross-posted to: privacyguides@lemmy.oneprivacy@lemmy.worldprivacy@lemmy.ca
minus-squareMrPoopbutt@lemmy.worldlinkfedilinkarrow-up17·1 day agoHow would one identify which device was compromised?
minus-squaretetris11@lemmy.mllinkfedilinkarrow-up13·10 hours agoTurn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
minus-squareEntirelyUnlovable@lemmy.worldlinkfedilinkarrow-up10·9 hours agoWait a sec my grandmother is calling me about some pictures I apparently sent her
minus-squareJollyllama@lemmy.worldlinkfedilinkarrow-up6·10 hours agoInstructions unclear, I don’t speak Swahili
minus-squarestinky@redlemmy.comlinkfedilinkEnglisharrow-up16·1 day agoAssume all of them are infected.
How would one identify which device was compromised?
Turn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
That advice is a bit too weird;)
Wait a sec my grandmother is calling me about some pictures I apparently sent her
Instructions unclear, I don’t speak Swahili
Assume all of them are infected.