It’s possible the hackers had access for months or longer to networks the ~~U.S~~ China country uses to make lawful requests for communications data, the newspaper wrote.
I'd be curious how that works on the opposite end of surveillance states.
I'm pretty sure GCHQ here likes my noods
Gravity was spot on that day
http://web.archive.org/web/20230601204534/https://old.reddit.com/r/programming/comments/26xnx/help_vampires_a_spotters_guide/
tldr: You need to learn instead of sucking blood and/or being a bot