The collected works of the Shadow Brokers, volume I.
Read by D.W. Bittner
You and we, together.
We follow Equation Group traffic.
We find Equation Group source range.
We hack Equation Group.
We find many many Equation Group cyber weapons.
You see pictures.
We give you some Equation Group files free, you see.
This is good proof, no?
You break many things.
You find many intrusions.
You write many words.
But not all
We are auction the best files,