blastiaobsessieanonymous: (Curious)
Rita Mordio ([personal profile] blastiaobsessieanonymous) wrote in [community profile] saveyourselves 2013-11-22 01:49 am (UTC)

I'm not quite sure I said what I meant.

Hack tracing in the real world basically consists of going from 'hop' to 'hop' - you know the connection that hacked you went to computer A, whose logs indicate a connection to computer B at the right time, whose logs lead to C, etc. etc. (This bars other detection methods like flat-out hacking the endpoint - doable but only if you already suspect a specific target).

So if computer C is set (by Britany) to be connecting to Britany's number, which is connected to the network on computer D, if the connection works at all (which is the first question), there'd be no IP address association between computers C and D - the data would, as far as normals think, seemingly just disappear into the aether.

A related question - if this method works, would data acquired in this way be able to be presented to normals? (Someone asked this IC'ly so Rita might think to test it)

Post a comment in response:

This account has disabled anonymous posting.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting