02-02-2017, 02:16 PM
remote access change could have some interesting consequences if it were able to be applied without recipient's consent. it could have applications both in a traitor trapping and isolating their target by revoking their permissions, and of course for law enforcement trying to inhibit a criminal's movements