Cyber security counter attack.

Install a virus on transponders that goes back to the trail of transmission.

Must be possible to trace Bluetooth.

But transponders, not infected computers.

Tabitha likes my laptop bag. Which is the closest I’ve been to my laptop in at least a month!
Posted in

Leave a comment