What if you snuck in a quantum comms backdoor into every smartphone and broadband modem — on the pretext of surveillance — and then used it as the primary network access to destroy the information control of the enemy?

That would be a trojan horse with a grin.

The men don't know, but the little girls understand. 😀🤟

In response Martin Geddes to his Publication

Only people mentioned by @KenMac in this post can reply

No replys yet!

It seems that this publication does not yet have any comments. In order to respond to this publication from Ken Mac, click on at the bottom under it