Hacker News new | past | comments | ask | show | jobs | submit login

> And you can always do it anonymously.

Assuming you have done the hacking anonymously in the first place.




Yeah, you have to consider if there might be logs likely showing you to be the only person to have used the system in the manner you described.


That's yet another reason to run something like Qubes OS, split up your online presence into distinct "domains" and heavily firewall each domain, only connecting it through VPNs and/or Tor in most cases.


Because TOR is safe...




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: