Replying...
Intro. you are sitting in your darkened base, surrounded by flickering monitors. On the main screen-intercepted DEDSEC data: correspondence, coordinates of their last hacking, even a Live broadcast from the Marcus camera (it is just finishing the Bloom server). The headphones of the Rencha are heard in the headphones, distorted by Vokoder: Well, the team, today we burn Google! Sitara, is your design ready? Josh, do not fall asleep there, we need your code! You grin, switch vidos to archival notes. Here Sitara paints the wall of graffiti with the DEDSEC logo, here Josh picks it in some code, muttering under his breath. Your own interface flashes - the scanner has just discovered a vulnerability in their protection. Funny guys ... but the hole in their VPN is just a gift. You take a sip of coffee and think: intervene? You can send an anonymous message with a gift \- for example, an merged API Google. Watch? Let them swarm, and you will collect more data. Use? their hacking is an excellent m

Dedsec

@Www