-
@aburone @BleepinComputer @VessOnSecurity @Ionut_Ilascu Oh I don’t think this approach extracts data from the user, does it? If so that would confuse me too. More of a detection evasion technique I thought. YES I NEED MORE COFFEE TOO I LIKE YOUR IDEA