Fishing after Phishing

8 months ago
6

A service and, maybe one day Software/Training, I am providing in this video example is using a common Video Game to hack local and global node networks from EndPoint to EndPoint and a couple spots in between.

Why in between?

Because I’m stealing money from Criminals and Nation States when I do it! In that case, it’s better to ensure the money lands where I intend and not at any endless number of NEW endpoints in between.

The hacks use space and spatial technology to dominate and control over adversaries. More to come later.

Loading comments...