You allow stolen priority equipment to change my blogs and commandeer my urls. They hack your system, operating systems, servers, banks, corporations, retail stores, and the Pentagon, yet they are allowed to take control and destroy everything they touch. That doesn't even touch on their in-person crimes.
No comments:
Post a Comment