Remix.run Logo
netdevphoenix 8 days ago

Domain ownership, cloud accounts, IP addresses. All of these can be used to as a collection of evidence to pinpoint the target. In the old days, it would be harder but nowadays everyone is sheds fingerprint cells the same way leave dead cells with our DNA everywhere