(no title)
antonzabirko | 4 years ago
> Finally, the hacker made a mistake. He skipped the VPN and entered a hacked KPN computer server directly from his home connection. With that, he exposed his home address.
Also this part seems like a lie.
antonzabirko | 4 years ago
> Finally, the hacker made a mistake. He skipped the VPN and entered a hacked KPN computer server directly from his home connection. With that, he exposed his home address.
Also this part seems like a lie.
iso1210|4 years ago
MarcScott|4 years ago
> They let him do whatever he wanted. If he felt like gaming, he’d boot up Windows. But more often he chose Linux, his go-to operating system.
Why is this important? This is exactly what I do. I also frequently use a VPN, yet it's treated in the article as if the use of such technologies automatically labels you as some sort of nefarious hacker.
saberdancer|4 years ago
They could do a cross reference by checking his connections to the outside and then times when the hacker was "attacking". They could also drop his internet connection for a bit to see if the hacker gets disconnected.
And looking at how it was portrayed, it's doubtful his PC was "clean", especially if they catch him in the act.