Ahmad Tawakli wrote in A:
Two days ago, I received some emails from one of the apparently social networks that some of my compatriots had expressed their desire to be friends with me. Since I don’t have the time to do these things, I wrote them a few lines with the same text in response to pay my respects. One of them is:
Bismillah
Hello Mr. Salari
Thank you for your favor. I love you and all the faith brothers. But I am incapable of friendship in the sense of relationship due to lack of time. If you have any questions, please let me know. May the birthday of Amir Momenan be blessed. Ahmed Tawakli
Today, I received a reply from Mr. Salari, which contains valuable information about Internet espionage, so I thought it appropriate to inform the esteemed users about it. Although it may not be new for some dear ones, it will not be useless to remember it. The text of the said answer is:
Hello
Thank you for your kindness and attention, and congratulations on the birthday of Maulana Abi al-Hasan Ali Ibn Abi Talib.
Unfortunately, this friend request that you received is an internet robot that came to me from a friend and I thought it was a social network and accepted it.
But by stealing people’s e-mail information, this robot sends a copy of a friend request from the same person to all those who are in his mailbox, and they also steal all the information of your mailbox in the same way and in fact, who you are dealing with. Who are you dealing with in what areas, what topics are you interested in, and so are all those around you and finally.
I am glad that you did not apply it, and please inform all your friends, especially those who, like you, are in serious responsibilities and may have important information in their email.
I guess that this project is to collect and classify a series of information about the influential figures of the Islamic Republic.
In the last month, I have seen many children of Hezbollah who have been involved with this email. The individual information that is stolen may not seem important, but the collection and classification of this information can be very valuable for the enemy to determine the spectrum of effective forces of the Islamic Republic in all fields, especially now that cyber attacks have been identified. It is one of the main priorities of the enemy.
Mostajar