1.
Screenshot Evidence
2.
System Restore
3.
Ctrl+Alt+Delete
4.
Data Wounds
5.
Cloud Storage
6.
IP Blocked
7.
Read Receipts
8.
Ghost Protocol
9.
Cache Cleared
10.
Backup Plan
11.
Trusted
12.
Leak Season
13.
Invisible Ink (1)
14.
Notifications Off
15.
Cold Storage

