• 27 Posts
  • 1.18K Comments
Joined 3 years ago
cake
Cake day: November 19th, 2021

help-circle



















  • I wouldn’t really call it a hacker tool any more than you would call a hammer a thieves tool.

    It just accesses the data that stored in an unencrypted format on the computers hard drive.

    If someone had remote access to your computer they could use this, but I imagine they could also use the official tool too.

    Since the data is stored in an unencrypted fashion, a hacker who had remote access would be better served running some script that will just transfer all this data to their offsite server and could be accomplished pretty easily.

    I guess what I want to really say is that calling it a “hacker tool” is misleading.