Anonymous ID: 2a66ee Dec. 28, 2019, 11:05 a.m. No.7644479   🗄️.is 🔗kun   >>4800

>>7643939 (Last Bread)

 

The only way to sustain that bandwidth would be from a nearby source. Hackers often proxy their activities through zombie machines. Whoever it was could’ve used the zombie machine’s local storage for storing the data at the higher bandwidth and then after the hack they could’ve trickled it back from the zombie machine through the proxy chains. If this was the case then hypothetically there is a possibility that somebody’s grammy who was playing solitaire while it habbened, still has the data on their machine.. kek