Thanks. I have always been wondering how the "hackers" (not in the sense of the way described in "How to be a hacker") managed to protect their traces while hacking other people's computers/networks. For sure many of them are gov entities so natually it's a lot easier to cover their tracks, but many of them are not.
I'm not sure what is currently beeing used, and I guess that really depends on what exactly you are doing. But I know that often infected Computers are used as a VPN or Shadowsocket to cover ones tracks. Combine that with several layers of protection and it gets harder and harder to track one down