▲ | IlikeMadison 10 hours ago | |||||||
What always interests me in these type of cases is how do hackers get identified? Aren't they savvy enough to use some sort of proxies to cover their tracks? | ||||||||
▲ | immibis 10 hours ago | parent | next [-] | |||||||
No. | ||||||||
▲ | squigz 10 hours ago | parent | prev [-] | |||||||
It only takes 1 mistaken connection for it all to fall apart. | ||||||||
|