He uses a 'laptop' for business when he travels.
(..) at and I instru-- Okay, wait, wait, wait. So that's almost a half hour after the initial breach. Why didn't anyone pipe in from their laptops? - It's not protocol-- - It wouldn't have been secure if someone terminaled in on this. It was the smarter move (..)2015 TvShow: Mr. Robot Title: eps1.0_hellofriend.mov Season: 1 Episode 1