🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 22 days agoThe fascinating security model of dark web marketplacesboehs.orgexternal-linkmessage-square11fedilinkarrow-up133arrow-down10cross-posted to: lobsters@lemmy.bestiver.se
arrow-up133arrow-down1external-linkThe fascinating security model of dark web marketplacesboehs.org🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 22 days agomessage-square11fedilinkcross-posted to: lobsters@lemmy.bestiver.se
minus-squarestinky@redlemmy.comlinkfedilinkarrow-up2arrow-down4·21 days agoThat’s right, you can. But my question was about specifically which message the author was talking about, not the general technology being used. That’s why I said “which message”.
That’s right, you can.
But my question was about specifically which message the author was talking about, not the general technology being used. That’s why I said “which message”.