32
Comments (1)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
1
politifox 1 point ago +1 / -0

just looked really quickly , looks like it is a listener app that is "injected" to a machine and the backend software to observe / record.

What that is showing is the building of the software through iterations (2 week sprints) ..

So they had requirements gathering , then they made tasks etc. and then they executed but this is sparse and the links would be on a local intranet so we just get sparse info.

Be funny to see what the requirements are

  1. hack elections
  2. profit