So how do you know for certain that this communication took place over "open cell", and assuming that it did how does invalidate the communication? Are we to believe that cybersecurity professionals don't use cell phones, and if not what do they use?
You are viewing a single comment's thread from: