" Iwould use a military grade C encryption tool. It would involve me pinging the cell remotely and using a array of malware encrypted texts, bug infested cell transmissions and Geo-location acces, which would then spill to creating a background access into the target device as you can tell this is not a easy decryption process. In a bid to achieve excellence i would require your attention on time."
I am talking to proclaimed hacker about hacking android so replied me with this answer ... so is it really possible?
Be the First to Respond
Share Your Thoughts