Editing 2176: How Hacking Works
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 21: | Line 21: | ||
==Transcript== | ==Transcript== | ||
+ | {{incomplete transcript|Do NOT delete this tag too soon.}} | ||
:[Two panels with a caption below each panel:] | :[Two panels with a caption below each panel:] | ||
β | :[Three masked characters standing near a desk with a computer inside a home | + | :[Panel 1 - Three masked characters standing near a desk with a computer inside a home] |
:Masked Character 1 [holding a walkie-talkie]: Control, we have flown to the USA and breached the target's house. | :Masked Character 1 [holding a walkie-talkie]: Control, we have flown to the USA and breached the target's house. | ||
:Masked Character 2: They wrote all their passwords in a book labeled "Passwords"! | :Masked Character 2: They wrote all their passwords in a book labeled "Passwords"! | ||
Line 31: | Line 32: | ||
: How people think hacking works | : How people think hacking works | ||
β | :[Two Cueball-like characters, each sitting on opposite sides of a single desk with laptops in front of them] | + | :[Panel 2 - Two Cueball-like characters, each sitting on opposite sides of a single desk with laptops in front of them] |
:Cueball 1: Hey look, someone leaked the emails and passwords from the Smash Mouth message boards. | :Cueball 1: Hey look, someone leaked the emails and passwords from the Smash Mouth message boards. | ||
:Cueball 2: Cool, let's try them all on Venmo. | :Cueball 2: Cool, let's try them all on Venmo. |