You would think such people would be competent enough to proxy their operations through at least a layers of compromised devices, or Tor, or VPNs, or at least something other than their own IP addresses.
OP has just completely pulled this analysis out of their ass. They aren’t all constantly running g cyber operations on Reddit, that bears zero resemblance to what cyber operations look like in real life including the point that you raised.
You would think such people would be competent enough to proxy their operations through at least a layers of compromised devices, or Tor, or VPNs, or at least something other than their own IP addresses.