Cowboys of Creepware: An Appendix
Morgan Mayhem
1

Are there things non-infosec peeps can do that will be helpful to ensuring our own security, that we can do with those hashes? I don’t even know what to do with them or how they’d be decrypted. Also: you rock a silk tie like nobody’s business…