by oferzelig on 1/15/19, 1:21 AM with 2 comments
But then they didn't follow up with their conclusions:
1. Who hacked 2. How the hack was executed 3. What are the steps they took to help affected users (if at all) 4. What are the steps they took to prevent future hacks from happening in the future (if at all)
Does anyone know?
by navjack27 on 1/15/19, 5:40 AM