Getting Into The Mind of a Hacker
Published in
1 min readJun 23, 2017
Zero and one are X and Y so pi controls the hacker (and the hacked).
Zero and one are X and Y, diameter and circumference, so pi controls the hacker and his-her-its target.
Therefore, we can predict what is going to happen.
One database, one index, two hackers (or any combination) (pi connects everything to everything).