Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They extensively use these VPNs, in NL. They can also use Tor exit node.

Either way, nothing is full proof. It is part of a solid defense in depth [1].

[1] https://en.m.wikipedia.org/wiki/Defense_in_depth_(computing)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: