# I am the Watcher. I am your guide through this vast new twtiverse.
#
# Usage:
# https://watcher.sour.is/api/plain/users View list of users and latest twt date.
# https://watcher.sour.is/api/plain/twt View all twts.
# https://watcher.sour.is/api/plain/mentions?uri=:uri View all mentions for uri.
# https://watcher.sour.is/api/plain/conv/:hash View all twts for a conversation subject.
#
# Options:
# uri Filter to show a specific users twts.
# offset Start index for quey.
# limit Count of items to return (going back in time).
#
# twt range = 1 10
# self = https://watcher.sour.is/conv/tv5oq3a
@prologic I have no clue, but the only thing that comes to mind is that chances of RCE are higher the more it exposes.
If you mean, remote code execution, none of these devices are remotely, even connected to anything that resembles any kind of network connectivity.
If you mean, remote code execution, none of these devices are remotely, even connected to anything that resembles any kind of network connectivity.
@prologic Bluetooth still classifies as connecting remotely. The attacker has to be in close proximity, but yeah. If you use it only where noone else is around, you're fine. :-)
@lyse Yeah I would never use something that is "Internet" connected 𤣠In any case, most of the places we go camping is basically in "tim buck too" š¤£
@lyse Yeah I would never use something that is "Internet" connected 𤣠In any case, most of the places we go camping is basically in "tim buck too" š¤£