if this is real, usable, and accessed by someone free, a usual behavior
would be to log in with those credentials and download any remaining data
and provide it to the public. (there may be no remaining data, I do not
know)

it would also be great to get a keylogger that writes to a blockchain
somewhere out there

usually when stuff like this is shared it becomes immediately obsolete from
the fallot

Reply via email to