Hi there!\r\n\r\nI regret to inform you about some sad news for you.\r\nApproximately a month or two ago I have succeeded to gain a total access to all your devices utilized for browsing internet.\r\nMoving forward, I have started observing your internet activities on continuous basis.\r\n\r\nGo ahead and take a look at the sequence of events provided below for your reference: \r\nInitially I bought an exclusive access from hackers to a long list of email accounts (in today's world, that is really a common thing, which can arranged via internet).\r\nEvidently, it wasn't hard for me to proceed with logging in your email account \r\n\r\nWithin the same week, I moved on with installing a Trojan virus in Operating Systems for all devices that you use to login to email.\r\nFrankly speaking, it wasn't a challenging task for me at all (since you were kind enough to click some of the links in your inbox emails before).\r\nYeah, geniuses are among us.\r\n\r\nBecause of this Trojan I am able to gain access to entire set of controllers in devices (e.g., your video camera, keyboard, microphone and others).\r\nAs result, I effortlessly downloaded all data, as well as photos, web browsing history and other types of data to my servers.\r\nMoreover, I have access to all social networks accounts that you regularly use, including emails, including chat history, messengers, contacts list etc.\r\nMy unique virus is incessantly refreshing its signatures (due to control by a driver), and hence remains undetected by any type of antiviruses.\r\n\r\nHence, I guess by now you can already see the reason why I always remained undetected until this very letter...