The protagonist, a solitary individual, becomes convinced that someone has hacked into all of his devices and that these things are being used to manage and control him.
Read full
The protagonist, a solitary individual, becomes convinced that someone has hacked into all of his devices and that these things are being used to manage and control him.
Discussion