TheTwelveYearOld@lemmy.world to Privacy@lemmy.mlEnglish · 1 month agoI don't know what to do with this informationlemmy.worldexternal-linkmessage-square13fedilinkarrow-up164arrow-down13cross-posted to: privacy@lemmy.worldprivacyguides@lemmy.one
arrow-up161arrow-down1external-linkI don't know what to do with this informationlemmy.worldTheTwelveYearOld@lemmy.world to Privacy@lemmy.mlEnglish · 1 month agomessage-square13fedilinkcross-posted to: privacy@lemmy.worldprivacyguides@lemmy.one
minus-squareMrPoopbutt@lemmy.worldlinkfedilinkarrow-up8·1 month agoHow would one identify which device was compromised?
minus-squaretetris11@lemmy.mllinkfedilinkarrow-up7arrow-down1·1 month agoTurn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
minus-squareEntirelyUnlovable@lemmy.worldlinkfedilinkarrow-up6·1 month agoWait a sec my grandmother is calling me about some pictures I apparently sent her
minus-squareJollyllama@lemmy.worldlinkfedilinkarrow-up4·1 month agoInstructions unclear, I don’t speak Swahili
How would one identify which device was compromised?
Turn off your computer and make sure it powers down. Toss it in a 43-foot hole in the ground. Bury it completely rocks and boulders should be fine. Then burn any clothes you may have worn any time you were onliiiine
Wait a sec my grandmother is calling me about some pictures I apparently sent her
Instructions unclear, I don’t speak Swahili
That advice is a bit too weird;)