Read on to the end. Ken (the author of the post and the open source advocate in the story) reports about a conversation he had with other members of the attacker’s party. This conversation happened after the attack. The discussion reveals something interesting about the technical support strategy that underlies tech support for machines with Microsoft.
Leave a Reply