Attribution is one. In your own words leaked techniques are so primitive they simply cant be the stuff CIA is using, ergo _You_ personally wouldnt attribute this primitive piece of malware DLL injecting itself into a random text editor as state actor attack = success.
No comments yet.