this post was submitted on 08 Apr 2026
47 points (98.0% liked)
Privacy
4355 readers
75 users here now
Icon base by Lorc under CC BY 3.0 with modifications to add a gradient
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Aka infect target and read message after decrypt. No encrypt actually broke and no message actually intercept.