it would depend on the person and their objectives (maybe they're trying to find out what packet drops an item or hostiles etc..) to maybe further the developement of a hack or just for research purposes.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.