Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> military cyber operations

You would think such people would be competent enough to proxy their operations through at least a layers of compromised devices, or Tor, or VPNs, or at least something other than their own IP addresses.



OP has just completely pulled this analysis out of their ass. They aren’t all constantly running g cyber operations on Reddit, that bears zero resemblance to what cyber operations look like in real life including the point that you raised.


I mean, it was a quote, and they quoted it seemingly verbatim: https://web.archive.org/web/20160410083943/http://www.reddit...

Not sure what the "most addicted" means except for "over 100k visits total" but it doesn't seem to be pulled out of ops ass,


Tor was literally invented for this use case.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: