The comments in that post are wrong, the exploit does not rely on a technicality or specific rule variant. I explained how to do it in my post, cross-posted just now with Vanessa’s post here.
The comments in that post are wrong, the exploit does not rely on a technicality or specific rule variant. I explained how to do it in my post, cross-posted just now with Vanessa’s post here.