That being said: attributing those attacks to Chinese actors based on IP falls a little short. Proxychains exist and are used.
That being said: attributing those attacks to Chinese actors based on IP falls a little short. Proxychains exist and are used.