Any one in the IT field knows there are 2 different hacks that can penetrate any computer network. And one can be planted and extracted any data and leave without leaving a footprint. Even if the data is encrypted the algorithm lets the hacker view all the information. It is believed to actually penetrate the CPU bypass the buss and gain complete access to the raw memory. And again leave no trace behind. Being able to access the CPU unhindered means nothing is secure. Intel , amd need to reconfigure the CPUs. I read that in a wired news feed. The only positive side is it takes time. But nothing can stop it. I made my network a maze like the old FTP sites. There is over a thousand empty folders. If the can crack that I'll want to shake his hand. One is called "meltdown" I forget the other because this is the godfather of hacks. This is just my opinion.
... View more