🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 5 months agoThe fascinating security model of dark web marketplacesboehs.orgexternal-linkmessage-square11fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkThe fascinating security model of dark web marketplacesboehs.org🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 5 months agomessage-square11fedilink
minus-squarestinky@redlemmy.comlinkfedilinkarrow-up2arrow-down4·4 months agoThat’s right, you can. But my question was about specifically which message the author was talking about, not the general technology being used. That’s why I said “which message”.
That’s right, you can.
But my question was about specifically which message the author was talking about, not the general technology being used. That’s why I said “which message”.