Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Thanks. I have always been wondering how the "hackers" (not in the sense of the way described in "How to be a hacker") managed to protect their traces while hacking other people's computers/networks. For sure many of them are gov entities so natually it's a lot easier to cover their tracks, but many of them are not.


I'm not sure what is currently beeing used, and I guess that really depends on what exactly you are doing. But I know that often infected Computers are used as a VPN or Shadowsocket to cover ones tracks. Combine that with several layers of protection and it gets harder and harder to track one down


Thank you, this makes sense!




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: