Doesn't this mean that Alice could:
A: ddos Bob's media source and harvest the ip addresses etc of Bob's followers.
B: ddos Bob's media source and spread false information by high jacking Bob's media.
Doesn't this mean that Alice could:
A: ddos Bob's media source and harvest the ip addresses etc of Bob's followers.
B: ddos Bob's media source and spread false information by high jacking Bob's media.
No replies yet.