_____ _ _ _ _ __ __ _ _ _
| ____|_ ___ __ | | ___ (_) |_(_)_ __ __ _ | \/ | ___ | |__ (_) | ___
| _| \ \/ / '_ \| |/ _ \| | __| | '_ \ / _` | | |\/| |/ _ \| '_ \| | |/ _ \
| |___ > <| |_) | | (_) | | |_| | | | | (_| | | | | | (_) | |_) | | | __/
|_____/_/\_\ .__/|_|\___/|_|\__|_|_| |_|\__, | |_| |_|\___/|_.__/|_|_|\___|
|_| |___/
If you didn’t see the rise in popularity of hacking mobile technology, then you are either blind or stupid. Most of us saw this coming well over a decade years ago, and now it is prominently here. Screw hacking their computer, no one touches that shit anymore, target their phone, and you will get somewhere.