No.125665
Hypothetically speaking, let's say someone has pictures of someone else's credit cards.
How would that person be able to extract money from those cards without it being traced back through IP addess and MAC address?
This is a hypothetical scenario of course.
____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.