instruction stringlengths 24 29.9k |
|---|
Say I buy bitcoins from someone with cash (no bank, name, trace, etc.) and have them send it to a paper wallet/offline address. Yeah, there's a "trace" but to WHAT/WHO? It's bought with cash, etc.
With this offline address I receive it and send it to another person from it (not using any personally-identifiable Wi-Fi, ... |
When I connect to my "OpenSSH_8.2p1 Ubuntu-4ubuntu0.4" server alternating using
sftp -v -o HostKeyAlgorithms=ecdsa-sha2-nistp256 test-user@localhost
and
sftp -v -o HostKeyAlgorithms=rsa-sha2-256 test-user@localhost
I always get when switching from one algorithm to the other the following warning:
"WARNING: REMOTE HOST ... |
Is a Google login actually any more secure than a username and password login?
Assuming the username + password uses encrypted passwords in the DB and a 1 week access token, I don't really see how it would be more secure.
|
TL;DR: running npm i ... not long after pass my-password allows a malicious package to steal my entire password store.
I use pass as a password manager, on Linux. And like probably all Linux users, I use sudo to run commands as root.
The first time I retrieve a password with pass my-password, I need to type the passph... |
In their communication about the april 2022 breach (summary here), Heroku states that environment variables (other than Review apps and CI variables) were safe because they are encrypted at rest.
We also wanted to address a question regarding impact to environment
variables. While we confirmed that the threat actor ha... |
So I recently made a purchase from https://us.roborock.com, a well known manufacturer. During the checkout process, I used PayPal.
However several hours after checkout was complete, I received an email with the following content from the vendor:
I am sorry to tell you that our system reminds us your order is medium
ri... |
Microsoft provides several different services that check to see if you are on an untrusted device, even when accessing them from the browser. For example, they can be banned from SharePoint and OneDrive.
The documentation seems to claim that this is based on the device itself, not the network segment the device is conn... |
Let vc be a W3C Verifiable Credential Standard compliant verifiable credential. If I print it out on paper and loose it on the subway, can an attacker pick up the paper, type in the information into a JSON file, upload it to his wallet and
impersonate me?
learn the VC claims, i.e. name, date of birth (and whatever oth... |
We'd like to obtain the public IP of a user that connects via SSL VPN, the one that the user would have if he didn't connect that way.
But this looks impossible to do, if we use web services like the ones shown here: https://stackoverflow.com/questions/391979/how-to-get-clients-ip-address-using-javascript, when user is... |
I have noticed that a certain website, which uses sms as two factor authentication service, occasionally sends me the same 2fa code twice if the first attempt to login fails and I try again quickly.
I have never seen that behavior before and was wondering whether that's okay.
|
I have a virtual attack server that I've thrown 10 nics on so I can run multiple scans in tandem without interfering with each other. I haven't been able to find it, but does Nikto have a way to choose a specific interface to scan from? nmap has -e eth1 for example. I was curious if Nikto had something similar.
|
Did i misunderstand from this post?
RequiredAuthentications2 | Usually this is done to require pubkey and 2-factor authentication token, not the user's password.
you can use RequiredAuthentications2 pubkey,password to require both pubkey and password authentication. Usually this is done to require pubkey and 2-factor... |
I'm trying to get a better understanding of the technique of SSH tunnels. I have Nessus running within a Kali machine inside my environment and would like to access this a service via the browser on my own machine:
My Kali ----> Jump server ------> Internal Kali
I SSH from My Kali into the jump server with username:pas... |
Cheat Engine is a rather known memory editing and manipulation tool for Windows.
It has this feature to screw up your randomness generation, how does it achieve it?
My guess would be that it makes the initial conditions (like static noise, temperature microchanges and etc) artificially static and hence the PRNG fails t... |
During my work day, I came upon a website that had a popup that identified the company I work for(basically saying "contact us X company"). This website was never previously visited, cookies were blocked and the company I work for is relatively small. Typically when thinking about finger printing, the data is usually j... |
Are there any advantages to using SSH keys vs. a PAT when interacting with a site like Github?
Github claims SSH keys are a way to not have to enter your username + password (personal access token) with every interaction, however, my Keychain manager takes care of storing my personal access token and I'm not prompted a... |
On my school website I can list all existing accounts in the system to send them a message. Each account has a logo showing the user role (admin, professor or student) and I can directly filter on it.
As I know some of these peoples are likely to click on a link I send them via chat. Is it a bad security practice ?
Or ... |
From the manual of cryptsetup:
Passphrase processing: Whenever a passphrase is added to a LUKS header
(luksAddKey, luksFormat), the user may specify how much the time the
passphrase processing should consume. The time is used to determine
the iteration count for PBKDF2 and higher times will offer better
protection ... |
When i use only a passphrase in luks for my whole system partition encryption,
so i need to insert a password to decrypt my system partition to boot up my os,
is this unsecure and can it be cracked with bruteforce if someone stole the laptop?
What is the best way to do this, with a keyfile and store the keyfile to an u... |
Background: I've always reused same username/password on all websites and got hacked regularly. I am considering using a password manager, but I don't like the need of storing a database. So I came up with my own idea.
Assume there are multiple services for which one needs to be able to recover a password, each having ... |
When connected to my home network, I only use the Facebook app on my phone. I never log into Facebook via a browser on my laptop or other computer connected to my home network.
How is it possible that when I search for something on Google on any computer connected to my home network, I am soon after targeted by ads rel... |
If one is using a VPN from the local machine, how much can a hacker on the local networks router inspect, modify or hijack the packets?
|
Context:
I'm filling my taxes and my country requires me to upload certain documents from my employer to verify the numbers I give to the government. These documents are "digitally signed", like so:
Now, before I use these certificates, I'm required to "validate" these signatures so that the sign above becomes a green... |
I am using a public wifi network.
When I start a nodejs express server at my local system at port 3000, I can access that website on another device (that is connected to the same public wifi network) by going to the http://(private ip address of nodejs host assigned by public wifi dhcp):3000/index.html , for example.
S... |
I have read that there are some capabilities that are broken out of CAP_SYS_ADMIN specifically CAP_BPF, CAP_NET_ADMIN, CAP_PERFMON etc. I also read that data structures called maps are used to store data and that other eBPF programs can read data in these structures. From a security point of view this is bad if sensiti... |
I am a beginner in analyzing javascript code on Linux and whenever the code is for a Windows machine I cannot proceed with debugging because there are undefined functions.
Examples:
GetObject(_6078(1),7983()) -> error GetObject is not defined
or
WScript[3938[43]](3999) -> error Wscript is not defined
Is there any way... |
I know that a password is stored as a hash, because then it is not possible to get the password even if you have access to the password database/file/...
But if you have access, couldn't you just replace the password hash with some hash where you know the related password, for example, if you know that 1234 has the has... |
Our company's customers can use our IdP to sign-in into about a dozen various service providers we make available. All are third parties running their own sites/domains. We periodically get complaints that signing into Service A doesn't automatically get you a client session on Service B (customers need to actually vis... |
Let's say I want to deploy a simple static website (with no backend server) with some protected pages only visible after entering a password.
I could write a hardcoded salted hashed password and encrypt the protected data with it, but the user can still go through the minified JS bundle and find the block that performs... |
I received a suspicious email in Outlook and wanted to check the from email field to see if it was still a Microsoft address.
I right clicked and selected "copy address" on the From field of an email in Outlook.
I attempted to paste from clipboard into Notes, a MacBook default text editor.
Outlook closed itself, and t... |
If I send an email through S/MIME protocol to a group of recipients, does the email client require to encrypt the same email content with each recipient's public key before sending to each recipient? If the email is sent to a big Distribution List, does it mean, it will create big overhead (eg: the size) compared with ... |
I am a little bit confused how this works and would greatly appreciate some explanation.
Say I have the following setup:
Virtual machine running VPN 1 --> Host PC running VPN 2 --> Destination website
Does the "destination website" see VPN 2 as it's origin IP, or no?
If yes, then can I assume that VPN 2 sees VPN 1 as i... |
The file can be downloaded from: https://www.vpay.co.kr/eISP/install/VPWSSetup_C.exe This is some stupid "security" ActiveX control that Korean government mandates for web commerce. On Windows 11, the signature is valid, but on Windows 10, it says that the certificate is not valid for the purpose. I am not sure why it ... |
Recently an organization I forgot to update credit card details had my renewal payment fail because I forgot to update details. They sent an email as below which had a direct link to a web form without any instructions to check authenticity. I think this is bad practice because it trains members to blindly accept direc... |
Recently, one of my services received a query where the JSON payload contained the string <an-arabic-character>\u0000bՕR. The service handled it gracefully so no real harm was done, but am I right to be suspicious of this activity ?
To make it fully clear, the first character is the "Arabic number sign" and has UTF-16 ... |
My son's school lent him a laptop to access a particular website- which I believe we can't do anyway because somehow it requires an organizational live account.
Can the school see what you are doing on their laptop when connected to your home WiFi?
Assuming we don't care if the school surveils the use of this laptop. O... |
I have two machines, let's call them "Server" and "Gateway", communicating through SSL. A PKI cannot be established, communications outside a company private LAN is not permitted. Both machines can create self-signed SSL certificates (OpenSSL).
Communications is always initiated by the "Server".
The "Gateway" doesn't n... |
I have an authorization server that generate JWTs, the JWTs are signed with a private key (RS256) stored on a hardware security module. The tokens are generated only after a successful authentication.
What measures can be taken to prevent internal actors from using the authorization server to forge JWTs ?
|
I use dnscrypt-proxy's anonymized DNScrypt with multiple relays, force it all to use TCP, route them over Tor.
Does this prevent my ISP or anyone in my country to see my DNS queries and client hellos when connecting to websites and servers hosted outside?
What can my ISP see about apps and websites/webpages I visit whe... |
I was just going through TPM Overview and What makes TPM chip Endorsement Key Non-migratable? but it seems like the "trust" is a matter of "trusting" the manufacturer to not be malicious or be negligent in developing the platform.
I didn't really see any way of verifying the trustworthiness in that there is no way to t... |
I am designing an new web application with a web-api backend. We want to try using OpenID Connect and we are looking into the best way to authorize the user for the API.
Setup:
User logs in into front-end and gets an OAUTH token.
Send OAUTH token to web-api to authorize the user
Return a bearer-token which is needed t... |
I'm deploying an AWS Infrastructure that should adhere the CIS Benchmark.
I'm trying to understand if the TCP port of the VPN server that permits access to the VPC has to be considered as a "Server administration port" and thus the access must be allowed only from specified IP addresses as stated in
5.1 Ensure no Netw... |
I received a paypal scam email yesterday in the mail(*), which isn't particularly noteworthy, apart from the fact that not only was the sender paypal.com but the post was sent from mx4.slc.paypal.com.
Authentication-Results: spf=pass (sender IP is 173.0.84.229)
smtp.mailfrom=paypal.com; dkim=pass (signature was verifie... |
I was trying to download something off a sketchy website, and ISO was a reasonable extension for what I was trying to get, but I was still pretty sure it was malicious. I didn't put much thought into it, and went "well, ISO isn't directly executable, right? It's just an archive." and downloaded it, scanned it with micr... |
OIDC says mTLS can be used to authenticate the client. But I haven't read anywhere whether the OIDC Provider is supposed to accept self-signed SSL certificates. Are there any dangers to accepting self-signed certificates? Should these self-signed certificates be rejected when validating the certificate, or are they as ... |
There is one offline Root CA. There are 3 issuing CAs, each on their own domain. There are domain trusts in place, but these domains are not in the same forest.
All 3 domains and CAs are managed by a different team.
These 3 issuing CAs were created for 1 application that connects to computers in all 3 domains, verifi... |
Suppose you're interested in establishing a TLS connection with a specific host, and won't be using any sort of CA, or x509 certificate chains - you only want to compare if the target host uses a specific certificate. How would you make this comparison?
Compare the thumbprints (apparently not recommended the thumbprint... |
I have a Dell laptop with a Haswell CPU, and the recent Retbleed vulnerabilities made me think how vulnerable it is in general. The whitepaper implies Haswell quite a lot, but it wasn't tested. I keep my microcode package up-to-date, but it seems there wasn't any upgrade in the past 2.5 years:
# dmesg|grep microcode
[ ... |
SMS is a quite common, albeit insecure, 2FA method. Why is email not more common? If someone is using a computer, they almost certainly have an email address, while it is less certain that they have a phone number (and one that can receive texts at that; landlines do not, and some people disable SMS). Also, if I unders... |
I have a gpg key linked to my identity and real email address. I also use github with their private email functionality "id+username@users.noreply.github.com", which I set as my git email. The purpose is to avoid bots doing data scraping or such, collecting my email address from git commits.
I am wondering if I could u... |
Recently I have been receiving "Google Verification Codes" that I never requested and for password recovery of the google accounts that are not mine however are similar to mine. It might be possible that a user added a wrong email address (mine) as his/her recovery email, however, the frequency of receiving these email... |
I want to use mTLS, so for testing I created simple API. I wanted to check if I will receive the public key of the certificate after the client sends the certificate to me (the server) as I want to use this public key in future encryption. So I created client certificate with OpenSSL and sent it to my API. I got it in ... |
I am analyzing CVE-2022-0839.
When checking the commit, I don't understand why the commit is on a test class. I mean, how does a test class fix a vulnerable component? shouldn't the fix be done in the guilty class?
|
I am thinking of an application for storing/managing files of arbitrary types (e.g. PDF, JPEG, PNG, text).
Files are stored encrypted in the file system. Additional data ("metadata") is stored (unencrypted) in an unencrypted database.
A random 256 bit encryption key is generated for each file (file encryption key = FEK... |
This may be comparing chalk with cheese, but I'm wondering how these tools compare: pros and cons, similarities and differences, and situations where you would use one vs the other.
|
This likely stems from my complete lack of familiarity with encryption technology and IT security in general, however it isn't clear to me how biometric authentication (such as Apple's TouchID) makes the data it protects more secure than a simple password.
It's clear to me that, individually, biometric authentication i... |
Got a cheap new laptop to play old games with a VM of Windows XP/7, with the host being Windows 11.
Using a WiFi that isn't my own (as I don't plan on connecting to the internet with this laptop) I installed whatever updates were needed, along with Bitdefender and VirtualBox (Networking functionality wasn't included).
... |
I have a PHP application which calls third party api with username and password embedded in the XML API call from my side.
I would like to encrypt and store the username and password embedded in the api call somewhere other than the code.
The application I have has username password authentication for users to login be... |
This assumes that:
Machine is powered off
No UEFI backdoors
No Reflashing the firmware
No clearing the NVRAM (The point is to modify/read a small amount of NVRAM, instead of resetting it)
Device requires password to POST (Enforced by BIOS/UEFI)
Physical access
And I think this might be an XY problem, so:
I'm trying t... |
I plugged in a wireless mouse receiver while browsing its manufacturer’s website. Browser settings that allowed sites access to USB devices were turned off.
The manufacturer’s website, upon the plugging of the receiver, displayed a new webpage element in the form of a welcome message with the model number of the mouse ... |
I'm currently implementing a PowerShell script to call the Sophos API (https://developer.sophos.com/intro).
Write-Output "`nEnter the Sophos API key / client secret."
$ClientSecret = Read-Host -AsSecureString
$Ptr = [System.Runtime.InteropServices.Marshal]::SecureStringToCoTaskMemUnicode($ClientSecret)
$TheClientSecret... |
Binance public API supports access to specific operations with RSA key pair. Firstly customer generates an RSA key pair. The customer uses the secret key to hash(SHA256) the query string parameters and puts the hash value in the query string. The public key is sent in the same HTTP call in the headers.
Binance compares... |
I have a pki infrastructure for internal company use.
In this pki there are multiple registration authorities whose responsibility is to.
receive certificate issuance requests
verify the identity of the user/device/entity requesting the certificate
forward the certificate signing request to the CA if the verification ... |
If you’ve watched the news, you know that Secret Service text messages were deleted. Now they’re trying to recover them.
If those text messages were encrypted before deletion, and the key was also intentionally deleted, are those text messages still recoverable?
|
I was reading: IP Spoofing with real IP when TCP 3-way handshake has been made
Where the answer says:
First of all, every TCP packet has a sequential identifier, which
starts at a random position. (explained briefly in this discussion) So
if the attacker is spoofing (non-SYN) packets (trying to hijack an
existing conn... |
I got an Email (to my iCloud address) from Disney+. The email contained a subscriber agreement. I did not register for their service myself. On the Disney+ website I saw that there was indeed an account for my email address. Using "forget password" I was able to log into the account and change the password.
I contacted... |
I remember that some rare viruses can hide in MBR(it's 512bytes space).
It's difficult to be detected and even if I reinstall operating system, the virus won't disappear.
But how about it on the new format "GPT"?
Does this problem still exist on GPT disk?
If exist, what's the best way to clear it?
I'm using linux and I... |
I’m setting up a router at home, and I just created a CA and signed a cert with it. The first time I navigated to the router console, I was greeted with the familiar scary Safari warning about insecure certificates. I bypassed it, since I know the certificate was mine.
What exactly does the browser track so that it doe... |
I am setting up a postgres db that will never be used by humans. In fact, I really don't need to know it myself ever. I assumed that just using a 256bit(64 alphanumeric chars) hash of a unix timestamp IE:
date +%s%3N | sha256sum
A very important detail is I am not "hashing a password"... I am hashing a timestamp and u... |
I recently found a strange file in my user home directory.
~$ ls -li
total 16
...
262994 -rw-r--r-- 1 user1 user1 0 Jul 14 12:13 ''$'\020\243''end'$'\202\243''row̹'$'\246''column'$'\316\001'
...
I can't open, move or delete this file by name. I will try to delete it using
find -inum 262994 -exec rm {} \;
but before ... |
Is there any benefit of using a non-standard SSH port when PasswordAuthentication is turned off in sshd?
The only benefit of non-standard SSH ports I know of is a reduction of the amount of brute force attempts since most scanners only attempt logins at standard ports. But as far as I know, brute forcing a private key ... |
I'm totally not a Microsoft Windows professional. When it comes to Windows, I'm just a normal user. And as this user, I'm wondering why Microsoft isn't shipping a full potential Windows Defender by default. According to a few Blogs and IT-News, there is space to improve the using/behaviour of Windows Defender. By a Goo... |
In the TryHackMe's machine, there are some NFS shares that no_root_squash is enabled which allows attacker to create malicious SUID binary on the share with root privileges.
I mounted share successfully, then created a binary file with following command:
sudo msfvenom -p linux/x86/exec CMD="/bin/bash -p" -f elf -o moun... |
I'm planning to develop and operate a web service that might agitate a certain authoritarian government (not in G20, not known for its good human-rights record).
I'd like to prevent any kind of leak of my personal information. However, since the target audience of my web service will be regular citizens of this authori... |
I'm aware that writing a file with a reserved name such as CON.txt or CON.mp3, aux.txt, lpt1.html, etc. is not allowed by Windows and can be leveraged for enumeration.
However, what about reading a file with a reserved name?
For example, in my current web application, most invalid file requests return a proper 404 stat... |
IP addresses can change and the FQDN is slightly more constant. So I thought that FQDN based authentication instead of IP based authentication might be a good idea, but I didn't find any information about something like this on the internet so I figured something was causing it not to be used. But what? Wouldn't that b... |
For example, a password hash is: edgjcgo4866864rfhobd38790g764hkp
Does having the hash of the password make it easier for the attacker to crack the password than not having the hash?
If yes, why does having the hash make it easier to crack the password than not having the hash?
|
I don't know the technical possibilities of this attack, but the scenario as I will explain below sounds probable. So here it is.
I have a mobile app that does computation on the users phone and send the result to a database that can only be accessed once the user has logged in. The computation is important and can onl... |
I know that in TLS 1.2 the client generates PMS (Pre Master Secret) which is used to get master_secret and Key_Block.
Where Key_Block combined with clinet_random and server_random gives us: clientMAC, serverMAC, clientWrite and serverWrite.
For example clientWrite is used to encrypt all messages from client to server.
... |
Reading: https://mulloverthing.com/how-does-ssl-protect-against-replay-attack/ it says:
The SSL/TLS channel itself is protected against replay attacks using
the MAC (Message Authentication Code), computed using the MAC secret
and the sequence number. (The MAC mechanism is what ensures the TLS
communication integrity).... |
In TLS 1.2 the messages sent by client are encrypted under ClientWrite, and the messages send by server are encrypted under ServerWrite.
What about TLS 1.3? I don't see any Pre-Master-Secret being generated so what's the encryption and the decryption keys in this case?
|
I have to give a presentation at my university. In the room where I'm going to give the presentation, there is a projector with a HDMI, Display Port, or USB connection. I will have to plug one of them into my laptop.
My question: Could my laptop be infected with malware via one of these connectors? It should be noted t... |
On Quora, when I want to sign in using Google, I am redirected to this URL, which has a parameter client_id=917071888555.apps.googleusercontent.com.
Similarly, reddit takes me here, which has client_id=705819728788-b2c1kcs7tst3b7ghv7at0hkqmtc68ckl.apps.googleusercontent.com
These values remain the same across different... |
I wonder why certification (common criteria and stuff like that) of security critical hardware that is meant to be used in datacenters (e.g. link encryptors) includes some tests related to TEMPEST attacks.
It seems to me that the actual test procedures and requirements for TEMPEST in these certifications are not public... |
https://nexla.zendesk.com/hc/en-us/articles/360053720333-Database-Connection-Options
Specifically:
In a text editor, add the below public SSH key to the authorized_keys
file. The key must be all on one line. Make sure that you don’t
introduce any line breaks when cutting and pasting.
This is the last portion of "Step... |
How is the malware file signature generated? Does it use a sequence of bytes in the beginning, size, PE (export, import, section), etc?
And can the MD5 or SHA256 be considered a file signature for a malware file?
Note: I know that there's YARA that tries to identify a malware file based on a pattern.
|
I'm wondering if popular closed-source archiving software like WinRAR or WinZIP are tested regularly by other developers to check if they add some kind of intentional backdoor or unintentional weakness to the archives they create.
Does anyone have insight into this?
|
I have a Windows 11 PC, and several members of my family who aren't terribly savvy about what notifications they click "OK" on. Result: I now have some kind of malware called "trustedstreams.life" that regularly pops up notifications ranging from annoying ads to fake virus warnings and pornographic images.
I've googled... |
I have this message from Checkmarx:
The application's = embeds untrusted data in the generated output with location, at line 19 of ****.js. This untrusted data is embedded straight into the output without proper sanitization or encoding, enabling an attacker to inject malicious code into the output.
It is shown below... |
I understand TPM is quite an important tool for security, but a lot of the updates not being offered should not be related to TPM. Not offering updates to people who bypass TPM on Windows 11 and also providing information on how to bypass TPM seems strange to me. Looked around for an answer, but there doesn't seem anyt... |
I have an ESXi server that is using a self-signed certificate, and the browser gives a warning that SSL certificate cannot be trusted.
I want to put that cert into the Trusted Root Certification Authorities store.
Will that get rid of the warning message?
Also is it possible to create identical self-signed certificates... |
There are many new messaging apps that claim to be the most secure.
How can we be certain if there is actual encryption and what type of encryption?
Molly, signal, WhatsApp, briar, wire, telegram, Threema.
|
When we generate an API key in Binance there is a generated secret key too. I could not find any reference that those are RSA key pairs. They could be just random unrelated numbers. Is the Binance API Key the public key of RSA key pairs?
|
I'm choosing between Seabios and Tianocore as a coreboot payload.
Secure boot is a UEFI feature. I haven't found any mention of it in seabios documentation. It must be not supported.
Can anyone confirm it, please?
I guess since I want to use secure boot, I have to stick with Tianocore.
|
Is this behaviour of MongoDB secure?
Database TLS is turned on and the client's cert .pem is loaded on the machine. When the client-side app is launched and communicating with the database, the cert works with TLS and is able to save data from app to database.
However, using MongoDB Compass, I turn on TLS but did not... |
How is file location implying if a given file is possibly a malware or not?
Example:
Let's take windows wmiprvse.exe file. Web search results will often give you results similar to:
"If this is under C:\WINDOWS\System32\Wbem then it is genuine, anywhere else it is malware"
So my question is- why such location of that f... |
Back in February, well over 90 days ago, I reported a vulnerability to a service that is leaking highly sensitive data, such as passport id, full name, date of birth and medical data. After that I have sent a few more reminders about the leakage, but it still hasn't been fixed. What are the best next steps I can take t... |
For someone who deals with dangerous files and websites frequently or even for the general user what is the way to avoid getting infected by spyware/virus permanently?
I am looking to buy a new laptop and the problem mentioned above is what I am worried about. Here is one idea that came to my mind: Use two usbs. One is... |
Background Information
As I developer I am running multiple (partly virtual-)machines with Debian GNU/Linux and on some of these machines I work with highly confidential documents or dangerous executables like malware. (research and analytics)
Two days ago, after several high severity security vulnerabilities (DSA-5191... |
So, I wanted to get this game (to try it as it had no demo), so I went to a website, did not click on anything except the link to the Google drive folder, and then stupidly requested access to a Google Drive folder using my alt Google account. My alt account had my first name and potentially the initials of my second n... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.