b1ab

joined 1 year ago
[โ€“] [email protected] 1 points 1 year ago* (last edited 1 year ago)

Long story short.

  1. Be prepared for disaster.
  2. Scan it. Sandbox it if concerned.
  3. Firewall inspect/block/allow every outbound comm.
  4. Get it from a trusted source.

Basically the same stuff you should be doing with all software.

Edit for firewall clarification.

[โ€“] [email protected] 1 points 1 year ago

God bless the hackers, crackers, reverse engineers, and disrupters. Pray they help keep you free of too much pain.