So my company launched a new phone last week and it took hackers a whopping 4 days to hack the operating system.
So, how did they do it?
Up-Up-Down-Down-Left-Right-Left-Right-B-A-Start
This is even better than classic, this is epic.
(I don't know if that is an epic fail or win, though).
So, how did they do it?
Up-Up-Down-Down-Left-Right-Left-Right-B-A-Start
This is even better than classic, this is epic.
(I don't know if that is an epic fail or win, though).



I AM the evil bastard!

Comment