Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Perhaps he only communicated as satoshi over Tor.


Perhaps they practiced near perfect opsec.

VPN, their own IP, stealing access, TOR, hacking the routers and APs and cleaning up…




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: