15
Comments (3)
sorted by:
2
deleted 2 points ago +2 / -0
1
tommichael522 [S] 1 point ago +1 / -0

We're never going to be able to prove this without access to one of the compromised machines.

1
deleted 1 point ago +1 / -0