Let me ask the obvious question: what story would the Obama admin tell if the hacker did obtain personal info?
I suspect it’d look exactly like this story.
Probably. Unless they could blame it on Republicans. I just found it humorous that the hacker’s software did (or didn’t do) exactly what the original software does. But I do wonder... How is it discernible from original code if it doesn’t appear to do anything malicious.