Warning: Some posts on this platform may contain adult material intended for mature audiences only. Viewer discretion is advised. By clicking ‘Continue’, you confirm that you are 18 years or older and consent to viewing explicit content.
That would just cause chaos. Which might benefit the attacker but I think you’d be better off with smaller targeted strikes using the secret catalog of CIA/NSA hacking tools already available to them. Or I suppose why not do both.
That would just cause chaos. Which might benefit the attacker but I think you’d be better off with smaller targeted strikes using the secret catalog of CIA/NSA hacking tools already available to them. Or I suppose why not do both.