Approximately few months ago I have gained access to your devices, which you use for internet browsing.
After that, I have started tracking your internet activities._x000D_
Here is the sequence of events:_x000D_
Some time ago I have purchased access to email accounts from hackers (nowadays, it is quite simple to purchase such thing online)._x000D_
Obviously, I have easily managed to log in to your email account._x000D_
One week later, I have already installed Trojan virus to Operating Systems of all the devices that you use to access your email._x000D_
In fact, it was not really hard at all (since you were following the links from your inbox emails)._x000D_
All ingenious is simple. =)_x000D_
This software provides me with access to all the controllers of your devices (e.g., your microphone, video camera and keyboard)._x000D_
I have downloaded all your information, data, photos, web browsing history to my servers._x000D_
I have access to all your messengers, social networks, emails, chat history and contacts list._x000D_
My virus continuously refreshes the signatures (it is driver-based), and hence remains invisible for antivirus software.