
Laith Alkhouri @MENAanalyst
This includes everything from VPNs and @torproject to knives and vests to the blockchain and cryptocurrency. All of the aforementioned are exploited by threat actors. Heck, even CCTV cameras for that matter. 5/X — PolitiTweet.org