A further simpler method of creating Phony credentials should be to suborn on the list of officers involved with the document-issuing system by bribery or intimidation. This can also be coupled with the bootstrapping method described over to mount advanced assaults. The dwelling legend himself – IDGod. Working for more than a decade now – he