mmotyka@lsil.com wrote:
Wouldn't the time of the hack be pretty well known and wouldn't the RPI
firewall logs be timestamped or am I naive?
most likely that was a failed case of the assumption that the criminal
always returns to the site of the crime.