By following this tutorial, you acknowledge that you understand the risks and will use the Goldhen exploit responsibly.