How would the trojan work, though? Because if this trojan installs itself on your computer, then it would have to send back information to the state with evidence that you've, say, stored child pornography on your computer. How does the program distinguish whether what you've got on your computer is child pornography or not?



Reply With Quote