top | item 20852842 (no title) word-reader | 6 years ago It didn't have to be someone at Project Zero. Anyone with a bunch of network logs could have searched for some of the fingerprints or URLs that were publicly available and deduced the target from associated traffic. discuss order hn newest No comments yet.
No comments yet.