securityfag here.
I looked through all the code for the baker tools and couldn't find anything malicious. It looks legit to me. Mostly lots of code for gathering notables as far as I can tell.
securityfag here.
I looked through all the code for the baker tools and couldn't find anything malicious. It looks legit to me. Mostly lots of code for gathering notables as far as I can tell.
Spoiler: Most of the North Korean hacking is actually just clowns using proxies.
https://blogs.icrc.org/law-and-policy/2019/06/03/know-your-enemy-know-yourself-cyber-domain-attribution/
1) Bill doesn't work there anymore.
2) Microsoft is a huge intelligence asset, but they work with the good guys.
3) Microsoft won the contract; Jeff and Amazon lost bigly in their defense department bid and are bawwing about it.
> shills still using already debunked fake and gay "info" to try to discredit us
Hey, Dan: Thanks.
You're bro as fuck.
> end game 2.0