Search results

  1. A

    setting up an online anonymous presence.

    very interesting thread to better understand how tracking works and how hackers hide their identities. Thinking about the following use case: An hacker open his PC, he create a fake email address and he send a phising email to someone. The person that receives the email try to identify the...
Top