Originally posted by Mr. Spencer
View Post
Nowhere in my post did i make anything close to an assumption that people have been able to dip in and out of the network data for the whole twelve days.
Though when you make that point, what is to have stopped the hackers from taking that information and having it locally for twelve days without needing to be on the network?
Comment