pull down to refresh
0 sats \ 1 reply \ @StillStackinAfterAllTheseYears 24 Apr \ parent \ on: Samourai Indictment Count Two Could Have Serious Implications For All Wallets bitcoin
Even shady software can have uses -- the same software a hacker might use to get into a system is used by pen testers and white hat hackers to test and secure those same systems. Code is neutral.
I was using the idea of shady stuff as at least some way to look at some code that for instance turns off a computer's fan to force it to overheat... I would call that shady because while someone could be using it to increase cybersecurity the likelihood would be much more negative hence my reasoning.
reply