Tiny Recap on Early Systems Compromise History

Karl gmkarl at gmail.com
Thu Jun 10 13:41:25 PDT 2021


Something I left out is, at this point, it is clear that there are
influences that are defending the presence of security vulnerabilities in
software and hardware, and actually making there be more and more
vulnerabilities.

This basically puts military spy agencies and viruses in charge of the
globe.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 371 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20210610/e151fb6d/attachment.txt>


More information about the cypherpunks mailing list