The people using that technique have escalated and perfected that particular technique so that it could be used both as a surveillance route, but it can also be configured, as in a few years ago, as a great cannon kind of way where people configured popular websites to DDoS the website GitHub. That is very well-documented.

Keyboard shortcuts

j previous speech k next speech