A third-party cybersecurity firm were paid to drill a hole in a Tor-reliant operating system to uncover a man who spent years sextorting young girls.
This post appeared first on Naked Security Blog by Sophos
Author: Lisa Vaas
A third-party cybersecurity firm were paid to drill a hole in a Tor-reliant operating system to uncover a man who spent years sextorting young girls.
This post appeared first on Naked Security Blog by Sophos
Author: Lisa Vaas