She arrived at our interview on a sweltering Friday morning in a hotel suite on the Las Vegas strip with a small entourage of two other budding social media influencers, Amber Vixx and Stefanie Joy (also not their names).
But more troublingly, he had also planted the spyware on the systems of strangers across the country, proving that proximity isn't required to infiltrate someone's system.
But while hacking using trojan horse viruses is the most malicious way to infiltrate a system, shifty websites sometimes use basic techniques that take advantage of human behavior patterns.
During our wide-ranging conversation she'll talk confidently about the business of live streaming video, the ephemeral nature of online fame, Rashida Jones' controversial Netflix documentary and the markup on consumer eyewear.
But one question gives her pause."Have you ever thought about how intimate your relationship is with your computer?
Melissa wondered why her goof-off sister was IM'ing from the next room instead of just padding over—she wasn't usually that lazy—so she walked over to see what was up. Unlike Melissa, she opened it, expecting, say, a video of some guy stapling his lip to his chin on You Tube. The girls pieced together the clues and agreed: Suzy's AOL account had been hacked.