Fishing after Phishing
A service and, maybe one day Software/Training, I am providing in this video example is using a common Video Game to hack local and global node networks from EndPoint to EndPoint and a couple spots in between.
Why in between?
Because I’m stealing money from Criminals and Nation States when I do it! In that case, it’s better to ensure the money lands where I intend and not at any endless number of NEW endpoints in between.
The hacks use space and spatial technology to dominate and control over adversaries. More to come later.
6
views