Originally posted by rogue06
View Post
He was asking them to look for them, not give them up having already found them. The only way to do that would be to hack the systems or find someone else that already had hacked the systems.
And it wasn't 'after the fact', their hacking efforts were, in fact, coincident with the request.
Jim
Comment