If you consider that, if they want to enter into a system which is well-secured, they need to buy zero-day exploits. Then they have knowledge about how to attack systems.
j 下一段next speechk 上一段previous speech