willya@lemmyf.uk to Programmer Humor@lemmy.mlEnglish · 1 year agoAccompanied by bad acting and writingthumbsnap.comimagemessage-square103fedilinkarrow-up11.3K
arrow-up11.27KimageAccompanied by bad acting and writingthumbsnap.comwillya@lemmyf.uk to Programmer Humor@lemmy.mlEnglish · 1 year agomessage-square103fedilink
minus-squareHughJanus@lemmy.mllinkfedilinkarrow-up12arrow-down2·edit-21 year agoI am not a programmer by any means but I know enough to know they did their research. Except Tyrell called it “nome” instead of “g’nome” and I’m pretty sure TOR exit nodes can only see unencrypted data and the entry node can only see who sent it.
I am not a programmer by any means but I know enough to know they did their research.
Except Tyrell called it “nome” instead of “g’nome” and I’m pretty sure TOR exit nodes can only see unencrypted data and the entry node can only see who sent it.