What if you snuck in a quantum comms backdoor into every smartphone and broadband modem — on the pretext of surveillance — and then used it as the primary network access to destroy the information control of the enemy?

That would be a trojan horse with a grin.

Only people mentioned by @Royalraven in this post can reply

No replys yet!

It seems that this publication does not yet have any comments. In order to respond to this publication from Royal Raven, click on at the bottom under it