C231 Bomb hazard
Zhang Chun started to analyze the situation.
"Generally speaking, there are only three ways to steal research results. The first is to hack through the network and steal the data stored on the computer or server. "
"The second method is to infiltrate through agents or even attack directly. Of course, the enemy has already used this method, or even used it now