Cowboys of Creepware: An Appendix
Morgan Mayhem
1

Are there things non-infosec peeps can do that will be helpful to ensuring our own security, that we can do with those hashes? I don’t even know what to do with them or how they’d be decrypted. Also: you rock a silk tie like nobody’s business…

One clap, two clap, three clap, forty?

By clapping more or less, you can signal to us which stories really stand out.