Hacker explains: Why are electronics exploding in Lebanon?

SecurityFWD
19 Sept 202412:58

Summary

TLDRThe video discusses a sophisticated supply chain attack in Lebanon, where devices like pagers and walkie-talkies from a company called Apollo Gold exploded. The devices were part of a military switch to older electronics to avoid tracking. The explosions were likely caused by software triggering the devices to overheat their batteries, creating a targeted detonation. This incident highlights the risks of supply chain infiltration in electronics manufacturing, raising concerns about national security and the potential for similar attacks on other devices globally.

Takeaways

  • 🤖 Several friends reached out with concerns about electronics after reports of exploding devices in Lebanon.
  • 📟 The incident involved pagers, walkie-talkies, and other devices, especially those made by a company called Apollo Gold.
  • 📡 Apollo Gold licenses its pager design to other manufacturers, allowing modifications that could have led to the explosions.
  • ⚠️ Initial speculation involved possible infiltration of Apollo Gold's warehouse, but it's now believed to be a sophisticated supply chain attack.
  • 💥 The explosions were targeted and caused by a software signal sent to the devices, not random battery malfunctions.
  • 🔋 The explosions seem to have been triggered by a combination of modified firmware and the device's battery, likely causing thermal runaway.
  • 💻 The attack showcased a high level of expertise in electronics, manufacturing, and software, with precise timing and targeted detonations.
  • ✈️ Questions remain about how these devices passed through international travel undetected during the six-month period before they exploded.
  • 🔎 The situation highlights the risks of supply chain vulnerabilities and the potential for national security concerns with compromised electronics.
  • 📢 Additional reports suggest that other types of devices, such as walkie-talkies, also exploded, and the investigation is ongoing.

Q & A

  • What is the main concern the speaker is addressing in the video?

    -The speaker is addressing concerns about a series of explosions involving electronic devices, such as pagers and walkie-talkies, in Lebanon. These devices were part of a sophisticated supply chain attack, raising questions about the safety of other electronics like cell phones or laptops.

  • Why are pagers still being used, and why did a military organization switch back to them?

    -Pagers are still used because they are receive-only devices, which makes them harder to track compared to cell phones. The military organization wanted to reduce the risk of being tracked by using older technology that is less vulnerable to constant network updates.

  • What is the company Apollo Gold’s role in the situation?

    -Apollo Gold is a company that manufactures pagers, and they license their designs to other companies. This licensing allowed other manufacturers to produce their devices, which were involved in the explosion incidents. Speculation suggests that a supply chain attack may have compromised these devices.

  • How did the attackers exploit the supply chain in this case?

    -The attackers legally obtained the design of the devices through licensing, then modified the electronics, potentially adding explosive materials or altering software to cause the devices to explode after a certain time, possibly triggered by a signal.

  • What is the difference between typical lithium battery failures and the explosions observed in this case?

    -Typical lithium battery failures can result in fires or overheating, but they don't cause explosions that create blast waves and shrapnel. In this case, the explosions were more sophisticated, indicating the use of additional explosive materials or intentional design modifications.

  • Can other consumer electronics like cell phones or toasters explode in the same way?

    -No, it is highly unlikely that consumer electronics such as cell phones or toasters could explode in the same way unless they were compromised in the supply chain like the pagers and walkie-talkies involved in this incident. The explosions were part of a targeted attack.

  • How were the devices in Lebanon targeted specifically?

    -The devices in Lebanon were targeted by a signal that was transmitted to the affected devices, triggering the explosions. This suggests that the attack was sophisticated and aimed only at specific devices, rather than all devices sold.

  • What makes this supply chain attack particularly sophisticated?

    -This attack combined expertise in multiple fields, including electronics manufacturing, software manipulation, and chemistry. The attackers were able to create fully functional devices that worked normally for several months before causing a timed explosion.

  • Why hasn’t international air travel detected these compromised devices?

    -It’s unclear why international air travel screenings didn’t detect these compromised devices. The speaker speculates that the devices might have been designed to evade such detection or that none of the compromised devices were exposed to the conditions that might have uncovered the plot.

  • What impact could this attack have on global supply chains?

    -This attack will likely cause countries and companies to re-examine their supply chains as a matter of national security. It highlights the vulnerability of electronics to supply chain attacks and may lead to increased scrutiny and security measures in manufacturing processes.

Outlines

00:00

📱 Concerns About Exploding Devices in Lebanon

The speaker shares that many friends have asked about recent electronic device explosions in Lebanon, with concerns about their own gadgets like cell phones or toasters. The speaker explains that they will address these questions, specifically about pagers, walkie-talkies, and other devices affected in Lebanon. They share that they were tagged in a post on Mastodon, where the news first surfaced, and they encourage others to reach out via this platform for stories or tips. They hint at how widespread this issue is, with a developing story involving a company called Apollo Gold, known for making rugged pagers.

05:00

💥 Supply Chain Attack and Exploding Pagers

The speaker discusses the explosion of pagers produced by Apollo Gold, a company that licenses the manufacturing of their pagers to other companies. Speculation initially suggested a physical infiltration, but evidence now points to a sophisticated supply chain attack. The speaker, an experienced electronics manufacturer, explains how the attack leveraged access to manufacturing designs and speculates on how modifications to the device's circuitry or battery could have led to the explosions. This attack shows the vulnerability in licensing and supply chains, where seemingly legitimate devices can be modified to cause targeted damage.

10:01

🔋 Battery Explosions: Not Just Overheating

Contrary to theories of lithium battery overheating, the speaker clarifies that these explosions involved a detonation-like force, not simply battery fires. They share personal insights into electronics and battery failures, emphasizing that regular batteries don't cause explosions with shrapnel like the ones seen here. The speaker assures that common household devices aren’t likely to be compromised in the same way and notes the complexity of this particular attack, which combined software manipulation, chemistry, and electronics knowledge to cause the timed explosions.

📡 Walkie-Talkies and Additional Explosions

The speaker highlights further explosions involving walkie-talkies and other electronic devices, which have caused casualties. They point out that the walkie-talkie batteries appear to have been modified similarly to the pagers. They emphasize that the attack was highly sophisticated, involving detailed knowledge of supply chains, licensing, and technology to produce devices that functioned as expected for months before exploding. They question how these devices passed through air travel and other security measures undetected, highlighting the global implications for supply chain security.

🎯 Targeted Attacks and Remote Triggers

The speaker delves into the precision of the attack, explaining that only specific devices were targeted using a signal or error message that triggered the explosions. They discuss how the attack’s complexity involved hardware and software manipulation, leaving the world’s electronics and security experts in shock. The speaker reflects on the broader implications for national security, predicting that this event will push countries to scrutinize their supply chains more closely. They conclude with the understanding that the targeted nature of the attack and its ability to evade detection for so long makes this a unique and alarming case.

Mindmap

Keywords

💡Supply Chain Attack

A supply chain attack occurs when a malicious actor infiltrates a supply network to compromise products before they reach end users. In the video, the speaker explains that the exploding devices in Lebanon were the result of a sophisticated supply chain attack, where modifications were made to legally licensed electronics. This emphasizes the vulnerability in electronic manufacturing processes, where products can be tampered with during production.

💡Electronics Licensing

Licensing in electronics allows a company to legally manufacture and sell a product designed by another company. In the video, the pagers were produced under license by third-party manufacturers, which made it possible for attackers to introduce modifications, leading to the malfunction and explosions of these devices. This showcases how licensing agreements can be exploited in supply chain attacks.

💡Lithium Battery

Lithium batteries are commonly used in electronics due to their energy density and rechargeable properties. In the video, the speaker clarifies that while lithium batteries can overheat and cause fires, they generally do not detonate with the same intensity as seen in the exploding devices in Lebanon. This distinction highlights that the explosions were not typical battery malfunctions, but part of a larger, deliberate attack.

💡Thermal Runaway

Thermal runaway is a failure mode where an increase in temperature causes further heat generation, often leading to fires or explosions in batteries. In the video, the speaker speculates that the pagers and walkie-talkies involved in the incident may have been altered to trigger thermal runaway, causing their batteries to overheat and explode at a specific time. This concept is critical to understanding the nature of the attacks.

💡Printed Circuit Board (PCB)

A printed circuit board (PCB) mechanically supports and electrically connects electronic components. The speaker in the video, who is experienced in electronics manufacturing, suggests that the modified PCBs in the affected devices might have been a key element of the supply chain attack. PCBs were likely altered to include explosive elements or to facilitate the triggering of the explosions.

💡Firmware

Firmware is the software embedded into a hardware device to control its functions. In the video, the speaker discusses the possibility that the firmware of the radios and pagers was modified, allowing them to receive a signal or message that triggered the explosions. This highlights how firmware modifications can turn benign devices into dangerous tools when exploited maliciously.

💡Blast Wave

A blast wave refers to the pressure and energy generated by an explosion, which can cause significant damage. The speaker mentions that the exploding pagers and walkie-talkies produced blast waves, resulting in shrapnel and physical harm, indicating that the devices were designed to act as bombs. This underlines the dangerous and intentional nature of the attack.

💡Shrapnel

Shrapnel refers to fragments from an explosion that can cause damage or injury. In the video, the speaker describes the presence of shrapnel from the exploding devices in Lebanon, differentiating it from typical battery malfunctions. This detail emphasizes that the devices were intentionally designed to cause harm beyond just overheating or fire.

💡Pagers

Pagers are communication devices that receive messages and are often used in environments where privacy and tracking concerns exist. The video highlights that pagers were chosen by a military organization in Lebanon to avoid location tracking associated with modern smartphones. These pagers were part of the devices targeted in the supply chain attack, demonstrating how even outdated technology can be exploited in modern cyber warfare.

💡Targeted Explosions

Targeted explosions refer to devices that are designed to explode in specific circumstances or locations. In the video, the speaker reveals that the devices involved in the Lebanon incident only exploded in that country, triggered by a signal or message. This demonstrates a level of control and precision in the attack, indicating that it was highly targeted and sophisticated.

Highlights

Friends asked if they need to worry about their electronics, such as cell phones or laptops, due to the ongoing situation.

The developing story involves electronic devices like pagers and walkie-talkies exploding specifically in Lebanon.

The issue appears to be related to a company called Apollo Gold, which manufactures pagers used by a military organization that wanted less trackable devices.

Apollo Gold licenses its designs for others to manufacture, which has led to speculations of supply chain attacks.

Early speculation about infiltrations in the company's warehouse has shifted towards a sophisticated supply chain attack.

The supply chain attack appears to involve inserting technology that allows devices to explode at a later time.

While lithium batteries can overheat and catch fire, the detonations seen in this situation involve additional materials and modifications.

The attack targeted specific devices, suggesting that they were remotely triggered through a software command.

The design allowed the devices to function normally for several months before the coordinated explosions.

There was no evidence of this issue affecting consumer electronics like cell phones or toasters.

This is considered a highly sophisticated infiltration of the electronic supply chain involving software, hardware, and chemistry expertise.

The possibility of more global incidents of supply chain attacks is raised, with concerns about National Security implications.

The event will likely lead to an increased focus on securing electronic supply chains to prevent similar attacks.

The walkie-talkie explosions appear to be caused by modifications to the battery unit, which was likely triggered by firmware changes.

The entire attack is believed to involve transmitting an error message that activated the detonations only in specific devices.

Transcripts

play00:00

several of my friends have reached out

play00:01

to me and said hey you work with

play00:03

electronics pretty often I know that

play00:05

you've done some manufacturing uh what

play00:07

exactly happened here like do I need to

play00:09

be worried about my cell phone or my

play00:11

toaster or my laptop or what really is

play00:13

going on uh so today I'm going to take

play00:16

some questions in regards to the ongoing

play00:19

situation with pagers walkie-talkies and

play00:22

other devices all specifically within

play00:24

the country of Lebanon so uh yeah pretty

play00:27

crazy developing story I'm going to go

play00:29

ahead and put this on the screen just

play00:31

because uh it was the thing that I was

play00:34

tagged in most often also I wanted to

play00:37

shout out uh anybody who wants to kind

play00:40

of share a story with me or get

play00:41

something to talk about on the stream uh

play00:44

you can do that on my Mastadon account

play00:47

so I left Twitter a while ago just

play00:50

because um you know like things were

play00:52

were I think it was oh yeah December

play00:54

2022 uh if you want to tag me on a story

play00:57

you can always go to infos sec. exchange

play00:59

uh uh I am right here and this is how I

play01:02

originally found out about the story I

play01:04

was tagged really early and uh yeah so

play01:07

uh thank you to uh tag hunt for tagging

play01:10

me on the story uh the second that I saw

play01:12

it I knew that we were going to discuss

play01:14

it today so yeah if you got a tip if you

play01:16

got something you want to talk about on

play01:18

the stream probably the fastest way is

play01:19

tagging me there but of course I'm also

play01:21

going to go through our YouTube comments

play01:23

this week as well so oh also good to see

play01:26

everybody on the stream James uh SAQ uh

play01:29

a cat uh we are early here but already

play01:34

have some interesting stuff to cover so

play01:36

all right again let me pull up the story

play01:37

so it appears that yesterday um a number

play01:41

of electronic devices exploded so this

play01:43

was actually the one from today we also

play01:46

have where's the first story here we go

play01:49

um a bunch of uh pagers exploding

play01:53

yesterday here we go uh all traced to a

play01:56

company called Apollo gold so a while

play01:59

ago this military organization had

play02:01

decided that cell phones were too

play02:03

vulnerable to being tracked so they

play02:05

wanted to switch over to something that

play02:06

was like receive only and kind of went

play02:09

backwards towards uh electronics that

play02:11

haven't been used at least for uh for me

play02:14

anyway uh for a very long time so I

play02:16

haven't seen a pager functional in a

play02:18

while uh except for on like maybe

play02:20

medical professionals or things like

play02:21

that but uh these pagers are still in

play02:24

use and in particular they allow you to

play02:26

just receive instead of be connected to

play02:30

Network and then constantly update your

play02:31

location maybe it makes you a little

play02:33

harder to track I don't really totally

play02:35

understand the the decision to to go

play02:37

back to using pagers and why it offered

play02:39

so many specific benefits but that was

play02:41

the decision so there is a company uh

play02:45

called apoll gold that makes these pages

play02:47

that are very popular they're rugged

play02:48

they they work well uh but they also

play02:51

license the ability to manufacture their

play02:54

product to other companies so if you're

play02:56

a company that has x amount of money you

play02:59

can set yourself up and make it so that

play03:01

you have all the necessary uh files and

play03:04

everything to manufacture this product

play03:06

and sell it for yourself if you wanted

play03:08

to make a small modification like

play03:10

possibly modifying the battery or other

play03:12

elements of the circuit board or even

play03:14

the programming then that might be in

play03:17

violation of your terms of license but

play03:18

it would be completely uh something that

play03:20

you could do because once you license a

play03:23

design like this you're kind of setting

play03:24

yourself to be up uh to be able to

play03:26

manufacture it yourself provided you

play03:28

abide by the terms of that licensing so

play03:30

what it looks like here is early

play03:33

speculation was like oh somebody snuck

play03:34

into this company's warehouse and

play03:36

switched everything but it looks like

play03:38

the reality was much more of a supply

play03:40

chain attack so this is again I am uh a

play03:44

Electronics person that manufactures uh

play03:46

printed circuit boards and functional

play03:48

Electronics with a team of people who

play03:49

are much more experienced than myself uh

play03:52

fairly regularly so when it comes to my

play03:54

experience with uh Electronic Supply

play03:57

chains and Licensing and that sort of

play03:58

thing like I I worked around this enough

play04:00

to to kind of see how clever this was

play04:03

when it comes to having access to a

play04:05

design all the schematics everything you

play04:07

would need and then being able to

play04:09

manufacture it legally uh at least at

play04:12

first when when it's not exploding uh in

play04:15

a way that is very very difficult to

play04:16

trace the electronic supply chain is

play04:18

very muddy there's a lot of kind of the

play04:20

white label manufacturers well where

play04:23

maybe they have a factory and they'll

play04:24

gain the right to create a certain

play04:26

product but they're not the original

play04:28

manufacturer so that that appears to be

play04:30

what happened here when it comes to the

play04:32

first wave of devices where originally

play04:35

people were suspicious maybe this

play04:36

company had been infiltrated but it

play04:38

seemed like they were merely licensing

play04:39

their products so is it likely that your

play04:42

cell phone or toaster or whatever is

play04:43

going to explode no because it looks

play04:45

like a highly sophisticated infiltration

play04:48

of a supply chain that allowed uh the

play04:51

perpetrators here to be able to uh put

play04:53

out a device that functions normally and

play04:57

then at a predetermined time received

play05:00

software instructions to uh rapidly heat

play05:03

the battery and cause a second element

play05:06

to explode now it uh it's kind of

play05:09

difficult to say exactly what was done

play05:11

here like was the material in the print

play05:13

circuit board uh perhaps like combined

play05:16

with something that was explosive like

play05:17

was there an element added to the

play05:19

battery that uh was explosive like and

play05:22

maybe more efficient battery material

play05:23

was used in a in a smaller area it's not

play05:26

really known here but what is known is

play05:28

that this was not just lithium battery

play05:30

overheating I saw some people saying

play05:32

like you know any device could be uh

play05:35

theoretically caused to do this and that

play05:37

is absolutely not the case so that's the

play05:38

number one thing I wanted to to spell

play05:41

I've seen a lot of uh examples uh let's

play05:44

say of lithium batteries overheating

play05:46

exploding um shorting out you name it

play05:49

I've made a lot of mistakes in

play05:50

electronics and for example some of the

play05:52

batteries around like ebikes or like

play05:55

scooters are huge and if you make a

play05:57

mistake with them um a lot of energy

play05:59

will shoot out it's very energy dense it

play06:01

causes a fire but they don't exactly

play06:04

explode um a lot of energy is released

play06:06

very quickly they burn very fast but

play06:08

it's not a detonation and what I saw in

play06:10

a lot of the videos here was definitely

play06:12

a detonation uh a material that was

play06:14

exploding so fast that it was causing

play06:15

damage through a blast wave and shrapnel

play06:17

that is not something that just happens

play06:19

with a regular battery so uh unless your

play06:22

specific device was compromised at this

play06:25

Source it is not capable of uh exploding

play06:28

the way that we've seen in some of these

play06:30

videos so like some people who reached

play06:32

out to me in uh you know my friends were

play06:35

uh just curious like is it possible to

play06:38

hack a device so hard that it just

play06:40

explodes in this way and while it is

play06:42

possible to cause a fire and it is

play06:44

possible to maybe like you know burn

play06:46

like burn someone or uh cause damage

play06:48

it's certainly not possible to turn it

play06:50

into a device that throws that much

play06:52

shrapnel at least the way that we're

play06:53

seeing in this case so absolutely the

play06:57

wildest news I've seen probably in in

play07:00

five years I think like of of uh just

play07:03

covering like security news and uh just

play07:05

keeping an eye on this like this is a

play07:08

incredibly sophisticated supply chain

play07:09

attack that took advantage of Licensing

play07:12

it took advantage of software knoow it

play07:15

took advantage of chemistry knowhow and

play07:18

it also took advantage of uh electronics

play07:21

and Manufacturing knowhow so being able

play07:23

to produce a commercial copy of

play07:25

something and add new technology to it

play07:27

seal it have it operate for six months

play07:30

and then in a targeted fashion have it

play07:32

uh explode only in a single country um I

play07:35

mean and I don't think anyone's said

play07:37

this but did nobody who owned one of

play07:39

these devices fly like in that period of

play07:43

time anywhere uh or what sort of

play07:46

screening did this have to pass through

play07:48

in order for it to remain undetected for

play07:49

six months like you would think that

play07:51

International Air Travel like might have

play07:54

ruined that whole surprise but anyway

play07:57

like what I guess my my number one

play07:59

reaction all of this is how many other

play08:02

completely unrelated actors on like on

play08:05

other stages around the world were

play08:07

planning some sort of reveal that

play08:08

involved an exploding device whose

play08:10

millions of dollars of work is now

play08:12

ruined by this event because people are

play08:14

going to of course like you know I think

play08:17

most countries are gonna be like all

play08:18

right wow we really need need to examine

play08:19

this and probably discover other

play08:21

potentially unrelated plots to insert

play08:24

similar things into Supply chains as a

play08:26

result so really stunning that this is

play08:28

going to make people read examine Supply

play08:30

chains in a crucial way and see it as an

play08:33

issue of National Security never again U

play08:36

never again will uh we be ignorant to

play08:38

the possibility that a well infiltrated

play08:41

supply chain can have incredibly serious

play08:43

consequences so like you know normally

play08:45

this would be like oh no somebody put a

play08:47

spy chip by you know creating commercial

play08:49

copies this is not a spy chip this is an

play08:52

explody box uh that was added instead so

play08:55

um truly a stunning attack obviously

play08:58

that's why I was tagged in it so often

play08:59

like I I appreciate the complexity of

play09:01

this you have to have modifications to

play09:03

the original software or at least

play09:05

something that's able to cause what

play09:06

seems like a thermal runaway with a

play09:08

battery that heats like a a secondary or

play09:10

something that's uh very sensitive to a

play09:13

particular temperature to then go off

play09:15

and Trigger the rest of the explosive um

play09:17

there's a lot of speculatory information

play09:19

out there so uh just try to stick to the

play09:22

facts on this one um but yeah uh some

play09:25

pretty crazy stuff coming out today and

play09:28

just wanted to calm anyone's who for one

play09:30

is maybe like pushing their Electronics

play09:32

to the side worrying if like any LiPo

play09:35

battery could do this no it does not

play09:36

look like that is the case um this is

play09:38

truly like on the sucket level of crazy

play09:43

uh targeted attacks when it comes to

play09:44

electronics software infiltration

play09:47

Hardware infiltration you name it um

play09:49

this is quite an interesting developing

play09:52

story so I'm sure a lot of people in the

play09:54

electronic uh electronics world world

play09:56

are going to be talking about this uh

play09:58

people in the ha world are definitely

play10:00

talking about this uh and it's a story

play10:02

you're probably going to see continuing

play10:03

to pop up as the story develop now the

play10:05

fact that additional devices exploded

play10:08

today is something that I haven't even

play10:10

covered yet so uh today I saw several

play10:13

videos uh showing Walky talkies also

play10:16

exploding and it was mentioned that

play10:18

other quote other electronic devices

play10:19

were also uh exploding so these uh seem

play10:23

to be a bit more deadly in terms of

play10:26

actually like causing casualties from

play10:28

what was reported Ed but if you look at

play10:30

some of these photos it very much and

play10:33

from having owned radios like this it

play10:34

very much looks like the battery unit is

play10:37

what exploded here the battery unit

play10:38

Clips onto the back of these sorts of

play10:39

radios I've used them when I was a

play10:41

security guard uh and not this exact

play10:43

model but other Motorola radios and when

play10:46

the battery is clipped out in the back

play10:47

here there's a very large battery unit

play10:49

that is attached right here um that also

play10:52

communicates with the rest of the device

play10:54

through a little bust so it is possible

play10:56

if the firmware was modified on these

play10:58

that a signal from uh the radio could

play11:02

cause the battery to heat up and then

play11:04

possibly explode so kind of seeing a

play11:07

pattern developing here uh but we will

play11:10

have to see if there's any more

play11:11

information or details about this uh

play11:12

later in the day for now that's really

play11:15

all the information we have and again it

play11:17

does seem like this is something that

play11:19

has to do with the electronic supply

play11:21

chain um legally licensing some of these

play11:24

designs and then producing copies um

play11:27

which again requires a stunning amount

play11:28

of technolog know how to make sure that

play11:30

you're creating functional devices that

play11:32

are getting no complaints that operate

play11:34

as intended but also include new

play11:36

technology that's able to uh you know

play11:39

survive potentially getting left in a

play11:41

hot car flying on an airplane or other

play11:43

sorts of things that would like uncover

play11:46

uh other attempts to do this sort of

play11:48

thing so really gonna gonna have to have

play11:50

a lot of these questions answered before

play11:52

we know all the information but yes

play11:53

thank you all for tagging me in this um

play11:55

as an Electronics person I was talking

play11:57

with this with some of my uh talking

play11:59

with some of my colleagues about this

play12:00

last night just about uh how

play12:03

sophisticated of an attack this was and

play12:04

how uh targeted at the same time it was

play12:07

some people were also calling this an

play12:08

incredibly uh targeted uh strike in that

play12:12

it only went after specific devices so

play12:15

uh that means that there was a signal or

play12:17

a message that caused an

play12:18

error I think it was CNN that was

play12:20

reporting that there was an error

play12:22

message that was transmitted to all the

play12:23

devices that uh attempted to explode uh

play12:26

so the fact that this was targeted

play12:28

against specific devices uh it wasn't

play12:30

like every device uh that was sold all

play12:32

exploded at the same time it was

play12:34

actually a message that was sent to the

play12:35

device that caused it to uh go off so

play12:39

yeah uh lot to absorb today um I've

play12:41

spent uh several hours kind of trying to

play12:44

keep up with what's going on looking at

play12:46

photos uh chatting with other people

play12:48

that are uh kind of interested in it and

play12:50

uh yeah it's been a lot

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
ElectronicsExplosionsLebanonSupply ChainSecurityManufacturingPagersWalkie-TalkiesTech NewsSoftware Attack
Benötigen Sie eine Zusammenfassung auf Englisch?