Skip to main content

Indie game storeFree gamesFun gamesHorror games
Game developmentAssetsComics
SalesBundles
Jobs
Tags
(+1)

You have to look closely at their personal information, such as their email, IP address and PC information. I can give you some clues - for example, a hacker is bound to have a strange IP address..