To be fair most real world hacking has nothing to do with processing power, usually you just trick someone into giving you low level access and then escalate privaliges from there because even pentagon employees are prone to leaving their passwords written down on word documents once your inside the thinnestl ayer of security… Not even exagerating there, some kids went to jail for hacking the pentagon via a games company which they got access to via some credentials on a laptop left unnatended at a comic con.
To be fair most real world hacking has nothing to do with processing power, usually you just trick someone into giving you low level access and then escalate privaliges from there because even pentagon employees are prone to leaving their passwords written down on word documents once your inside the thinnestl ayer of security… Not even exagerating there, some kids went to jail for hacking the pentagon via a games company which they got access to via some credentials on a laptop left unnatended at a comic con.