# I am the Watcher. I am your guide through this vast new twtiverse.
#
# Usage:
# https://watcher.sour.is/api/plain/users View list of users and latest twt date.
# https://watcher.sour.is/api/plain/twt View all twts.
# https://watcher.sour.is/api/plain/mentions?uri=:uri View all mentions for uri.
# https://watcher.sour.is/api/plain/conv/:hash View all twts for a conversation subject.
#
# Options:
# uri Filter to show a specific users twts.
# offset Start index for quey.
# limit Count of items to return (going back in time).
#
# twt range = 1 13
# self = https://watcher.sour.is/conv/ptv7k6q
@prologic They just use stock photos for their articles. For anything regarding “hackers”, they use this: “Man in dark room in front of a screen showing white text on black background.” 🤪
@prologic They just use stock photos for their articles. For anything regarding “hackers”, they use this: “Man in dark room in front of a screen showing white text on black background.” 🤪
@prologic They just use stock photos for their articles. For anything regarding “hackers”, they use this: “Man in dark room in front of a screen showing white text on black background.” 🤪
@prologic They just use stock photos for their articles. For anything regarding “hackers”, they use this: “Man in dark room in front of a screen showing white text on black background.” 🤪
@movq True hackers know how to diguise their break-ins as innocent dir
output.
@lyse I mean, using the DOS command line for anything other than playing games should be illegal.....