diff --git a/Crimson_Defense/Crimson_Defense_H@ckers/README.md b/Crimson_Defense/Crimson_Defense_H@ckers/README.md index 4a57460..4a3db73 100644 --- a/Crimson_Defense/Crimson_Defense_H@ckers/README.md +++ b/Crimson_Defense/Crimson_Defense_H@ckers/README.md @@ -1,4 +1,4 @@ -![image](https://github.com/UACrimsonDefense/CyberSecurityClub/assets/33443987/b198a130-e340-4de5-91d7-9cfdb2ec7e99)![image](https://github.com/UACrimsonDefense/CyberSecurityClub/assets/33443987/714edf14-ea12-4681-80ae-ba0627dc06f3)# Meet the Crimson Defense H@ckers +#Meet the Crimson Defense H@ckers For a team that lives in the deep corners of the dark web, the Crimson Defense H@ckers really do know how to hide. After quite a long time of tracking them down, I got them all to give a description of who they are and how they got into hacking. They keep their true identity sacred, so the following information might not be accurate. There is a risk to putting your personal information out on the surface web, especially for an elite security team such as this one. There might be some truth to these, but since I can't be certain of it, I'll leave that up to you to decide.
## The Team