iirc it’s tls secured between client and server and again between servers. So no e2ee, but if you trust your provider, everything should be good.
iirc law enforcment regularly forces providers to reveal content of client’s mailboxes.
iirc it’s tls secured between client and server and again between servers. So no e2ee, but if you trust your provider, everything should be good.
iirc law enforcment regularly forces providers to reveal content of client’s mailboxes.


Here are the steps:
- The attacker creates a standard Git repository.
- They commit a single symbolic link pointing to a sensitive target.
- Using the PutContents API, they write data to the symlink. The system follows the link and overwrites the target file outside the repository.
- By overwriting .git/config (specifically the sshCommand), the attacker can force the system to execute arbitrary commands–
amazing.


deleted by creator


but there’s no way to know for sure
draw something from memory on a piece of paper, and then draw the same thing again while looking on a photo. --> can you tell the difference between the two drawings?


hm… actually I think that story only sounds excagerated, but is actually 100% true.


I like the story of guy in medival Münster who founded a classless christian society. When the army of his local loard came knocking, knew God was in his side, so he charged them alone. The army then cut him into pieces and nailed his balls to to towns gate.
Today there are 3 cages on the church of münster, containing the bones of the co-conspirtors
I probably got some details wrong, here are some sources:
https://www.dancarlin.com/product/hardcore-history-48-prophets-of-doom/
https://www.amusingplanet.com/2020/03/the-hanging-cages-of-st-lamberts-church.html


linux fork (not production ready yet) https://github.com/BrycensRanch/SnapX
ist das das vw werk in wolfsburg aus sicht von hbf?