• mstrk@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 year ago

    True. The damage is already done. The only value it can be extracted from it is to know the exploit that lead to the breach.