In your example, hypothetically, if we would be the one to be breached, we would be the one to be hacked, not the individual.

Keyboard shortcuts

j previous speech k next speech