|
4 | 4 |
|
5 | 5 | This is [name] from Adelaide Australia.
|
6 | 6 |
|
7 |
| - I hope all is going well for you in Sweden and Curl is running |
8 |
| - smoothly. Here is Adelaide Curl is not running so smoothly and I |
9 |
| - hope you can please confirm for me if you and your fellow |
10 |
| - programmers have been remotely accessing my Domains and IP |
11 |
| - addresses. |
12 |
| - |
| 7 | + I hope all is going well for you in Sweden and Curl is running |
| 8 | + smoothly. Here is Adelaide Curl is not running so smoothly and I hope |
| 9 | + you can please confirm for me if you and your fellow programmers have |
| 10 | + been remotely accessing my Domains and IP addresses. |
| 11 | + |
13 | 12 | I have seen quiet frequently your Badger nickname referred to in my
|
14 | 13 | Apple iOS analytic logs and many times I can see Curl references
|
15 | 14 | regarding information for your testing and experiments.
|
16 |
| - |
17 |
| - Now I do have actually copies of your domains showing up on reports |
18 |
| - I have obtained regarding my internet connections. |
19 |
| - |
| 15 | + |
| 16 | + Now I do have actually copies of your domains showing up on reports I |
| 17 | + have obtained regarding my internet connections. |
| 18 | + |
20 | 19 | I won’t write anything more I would just really appreciate it if you
|
21 | 20 | could please stop accessing my devices and privacy without my
|
22 | 21 | permission.
|
23 |
| - |
| 22 | + |
24 | 23 | If I am wrong please let me know and I will apologize in advance.
|
25 | 24 |
|
26 | 25 | I am happy to send you the details of what I have in writing.
|
27 | 26 | - Value: 151.101.129.91
|
28 | 27 | - Value: 2a04:4e42:200::347
|
29 |
| - E.G These are 2 domains that have connected to my LAN and WAN |
30 |
| - networks and I believe they directly relate to curl.se and |
31 |
| - info.haxx.se |
32 |
| - |
| 28 | + E.G These are 2 domains that have connected to my LAN and WAN networks |
| 29 | + and I believe they directly relate to curl.se and info.haxx.se |
| 30 | + |
33 | 31 | This practice of remotely accessing networks without any permissions
|
34 |
| - might be ok for some people but I find it very intrusive and |
35 |
| - extremely difficult to understand how it can be seen to be ok to be |
36 |
| - done under the disguise of testing. It could be described in many |
37 |
| - other ways. |
| 32 | + might be ok for some people but I find it very intrusive and extremely |
| 33 | + difficult to understand how it can be seen to be ok to be done under |
| 34 | + the disguise of testing. It could be described in many other ways. |
38 | 35 |
|
39 | 36 | Kind regards,
|
40 | 37 | [full name]
|
|
0 commit comments