In your example, hypothetically, if we would be the one to be breached, we would be the one to be hacked, not the individual.
j previous speech k next speech