You must log in or register to comment.
- davefischer ( @davefischer@beehaw.org ) 16•11 months ago
Trisolarans.
I have found the one and only answer I will allow.
- davefischer ( @davefischer@beehaw.org ) English1•11 months ago
I happen to be in the middle of book #2 right now, ha ha.
- Anonymoose ( @Anonymoose@infosec.pub ) 1•11 months ago
It could be a lot of things ranging from state threat actors looking for a toehold into a network or to cost the government time and resources or people doing it for the lulz.