Fairly easy if they used exchanges, services, or bought products that were involved in prior hacks like the Ledger list

Reply to this note

Please Login to reply.

Discussion

No replies yet.