top | item 20852842

(no title)

word-reader | 6 years ago

It didn't have to be someone at Project Zero. Anyone with a bunch of network logs could have searched for some of the fingerprints or URLs that were publicly available and deduced the target from associated traffic.

discuss

order

No comments yet.