You are viewing a single comment's thread from:

RE: @AdamKokesh, @BenFarmer: Alleged Attempts to Hack, Dox, Harass and Stalk me, using a Professional Cyber Security Expert.

in #kokesh6 years ago

So how do you know for certain that this communication took place over "open cell", and assuming that it did how does invalidate the communication? Are we to believe that cybersecurity professionals don't use cell phones, and if not what do they use?