What would you do if an attacker copy your base?

Printable View