40 Other Topic posted 2 years ago by SkiSkiUSMC 2 years ago by SkiSkiUSMC +42 / -2 69 comments share 69 comments share save hide report block hide replies
Even if it’s not directly deep state for the purposes of enemy list creation, it could be hacked and easily used as such.