bot@lemmy.smeargle.fansMB to Hacker News@lemmy.smeargle.fans · 1 year agoMicrosoft Defender Flags Tor Browser as a Trojan and Removes It from the Systemdeform.coexternal-linkmessage-square10fedilinkarrow-up185arrow-down11file-textcross-posted to: netsec@lemmy.worldsecops@lemmy.worldtechnology@lemmy.worldhackernews@derp.foo
arrow-up184arrow-down1external-linkMicrosoft Defender Flags Tor Browser as a Trojan and Removes It from the Systemdeform.cobot@lemmy.smeargle.fansMB to Hacker News@lemmy.smeargle.fans · 1 year agomessage-square10fedilinkfile-textcross-posted to: netsec@lemmy.worldsecops@lemmy.worldtechnology@lemmy.worldhackernews@derp.foo
minus-squareferret@sh.itjust.workslinkfedilinkarrow-up12·1 year agoIn defense of malware bytes, CE is notoriously shady
In defense of malware bytes, CE is notoriously shady
First I’m hearing of this
Not more than third party AVs