k icon indicating copy to clipboard operation
k copied to clipboard

Add Fig as an installation method to the README

Open ibayramli opened this issue 3 years ago • 2 comments

We recently listed this plugin on Fig Plugin Store, so we'd love to have Fig listed as a download method on your readme. We have over 100k users that will benefit from this.

Thanks so much and please let me know if you have any questions!

ibayramli avatar Jun 16 '22 21:06 ibayramli

am facing a serious and ongoing security breach affecting all of my devices. An unauthorized developer has gained access and installed development profiles without my consent, compromising my privacy and the integrity of my data.

I am requesting immediate action to: 1. Secure all my accounts and devices. 2. Remove all unauthorized development profiles, configurations, and code associated with my devices. 3. Revoke every suspicious provisioning or signing certificate linked to my devices. 4. Completely eliminate any programming, scripts, or embedded code connected to the following accounts: • [email protected][email protected] 5. Remove any unauthorized code or developer associations tied to my company website: https://alhejaz-nor.com

These certificates and configurations should not be recognized or accepted by Apple under any circumstance.

Apple is a reputable and highly trusted company, and I am confident it does not tolerate any form of misconduct that compromises user security or allows developers to exploit devices, inject code, or violate customer privacy.

I expect urgent and decisive action to restore the full security of my devices, accounts, and digital assets, and to ensure complete protection against any further unauthorized access.

ghost avatar Dec 09 '25 02:12 ghost

am facing a serious and ongoing security breach affecting all of my devices. An unauthorized developer has gained access and installed development profiles without my consent, compromising my privacy and the integrity of my data.

I am requesting immediate action to: 1. Secure all my accounts and devices. 2. Remove all unauthorized development profiles, configurations, and code associated with my devices. 3. Revoke every suspicious provisioning or signing certificate linked to my devices. 4. Completely eliminate any programming, scripts, or embedded code connected to the following accounts: • [email protected][email protected] 5. Remove any unauthorized code or developer associations tied to my company website: https://alhejaz-nor.com

These certificates and configurations should not be recognized or accepted by Apple under any circumstance.

Apple is a reputable and highly trusted company, and I am confident it does not tolerate any form of misconduct that compromises user security or allows developers to exploit devices, inject code, or violate customer privacy.

I expect urgent and decisive action to restore the full security of my devices, accounts, and digital assets, and to ensure complete protection against any further unauthorized access.

ghost avatar Dec 09 '25 02:12 ghost