0:00 / 0:00

15 seconds

15 seconds

Fishing after Phishing

9 months ago
6

A service and, maybe one day Software/Training, I am providing in this video example is using a common Video Game to hack local and global node networks from EndPoint to EndPoint and a couple spots in between.

Why in between?

Because I’m stealing money from Criminals and Nation States when I do it! In that case, it’s better to ensure the money lands where I intend and not at any endless number of NEW endpoints in between.

The hacks use space and spatial technology to dominate and control over adversaries. More to come later.

0 Comments

  • 0/2000