Drama aside can any coding guy explain how exactly the TR phishing was done? The guy's writing is very difficult to understand.

I am not interested in the drama about blackmailing. I would like to know how exactly was this done technically? The nitty-gritty of the code that was used or taken advantage of and how?

Like, if it's plsql, php, js, python, whatever and how?


Comments


[9 Points] USPSDirect:

You might as well go ask your mom how she deep throats dicks so well. She'll tell you the same thing all of us will... Practice.


[2 Points] DerGumbi:

All done in COBOL. With a little bit of Scheme mixed in for good measure.


[-16 Points] DickCheeseKillah:

Nigga ain't no one going to give you that info. Stop begging you filthy peasant. Now apologize.