From @nytstyles: "The hackee is able to see the music the hacker has chosen (either on the hacker’s device, or sometimes, presumably by accident, on the hackee’s). A portrait of the hacker often emerges," writes @Jonesiemanhttps://nyti.ms/2LyjB9c
0 replies
7 retweets
7 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
This account is no longer actively updated. Please follow