[-] rocky_patriot@programming.dev 2 points 9 hours ago

For example: A compromised host could detect whether you are downloading the script or piping it.

rocky_patriot

joined 1 month ago