[EMAIL PROTECTED] wrote: > > Wouldn't the time of the hack be pretty well known and wouldn't the RPI > firewall logs be timestamped or am I naive? > most likely that was a failed case of the assumption that the criminal always returns to the site of the crime.