Board Thread:Off-topic/@comment-26566521-20151209234142/@comment-25908355-20151210183112

Toastastrudel wrote: remooooved That ain't how it works.

A super rich and popular gem's computers vs Rebel hackers computers.

And once the hacking was over, it'd still be stealing stuff.

And that's not how comp identification works.

Each one is still slightly different internally, so if there were to be connected, each one would still be internally marked different. If the hacker removed it, it'd cause network glitches.

also, no convenientness plz) (K srry m8)