It wasn’t the lag from the employee’s computer to Amazon which was being monitored.
It was the lag from the hacker to the employee. Amazon could not have monitored the hacker’s computer.
It wasn’t the lag from the employee’s computer to Amazon which was being monitored.
It was the lag from the hacker to the employee. Amazon could not have monitored the hacker’s computer.