13 April, 07:26
What if you snuck in a quantum comms backdoor into every smartphone and broadband modem — on the pretext of surveillance — and then used it as the primary network access to destroy the information control of the enemy?
That would be a trojan horse with a grin.
That would be a trojan horse with a grin.
Notice: Undefined index: tg1tga_access in /home/admin/www/anonup.com/themes/default/apps/timeline/post.phtml on line 396
Only people mentioned by Royalraven in this post can reply