this is hacking from the inside!

can any of the things they are doing auditable? who knows what is being downloaded? of any program is installed, and what they could do?

Far fetch, but who knows if a foreign power is using this chaos to launch a cyber attack …

Like you said, no system can be trusted anymore.

Reply to this note

Please Login to reply.

Discussion

No replies yet.