- Oct 26, 2022
- 4
- 0
- 11
Hello
Suppose there is a person. Suppose this person have a device (A) and a device (B).
Also, have (X) and (Y) internets registered with their own credentials
(what I mean by internet, is modem, router, etc.).
Suppose this person use (X) internet with device (A) in time. But get hacked, infected, tracked and information stolen.
Then this person throw this device and internet away. (Delete them.)
Then make a fresh start with device (B) and internet (Y).
Since the hacker still has this person's credentials, can they also enter the (Y) internet that have the same credentials and hack device (B)?
Suppose there is a person. Suppose this person have a device (A) and a device (B).
Also, have (X) and (Y) internets registered with their own credentials
(what I mean by internet, is modem, router, etc.).
Suppose this person use (X) internet with device (A) in time. But get hacked, infected, tracked and information stolen.
Then this person throw this device and internet away. (Delete them.)
Then make a fresh start with device (B) and internet (Y).
Since the hacker still has this person's credentials, can they also enter the (Y) internet that have the same credentials and hack device (B)?