Hack tracing in the real world basically consists of going from 'hop' to 'hop' - you know the connection that hacked you went to computer A, whose logs indicate a connection to computer B at the right time, whose logs lead to C, etc. etc. (This bars other detection methods like flat-out hacking the endpoint - doable but only if you already suspect a specific target).
So if computer C is set (by Britany) to be connecting to Britany's number, which is connected to the network on computer D, if the connection works at all (which is the first question), there'd be no IP address association between computers C and D - the data would, as far as normals think, seemingly just disappear into the aether.
A related question - if this method works, would data acquired in this way be able to be presented to normals? (Someone asked this IC'ly so Rita might think to test it)
no subject
Hack tracing in the real world basically consists of going from 'hop' to 'hop' - you know the connection that hacked you went to computer A, whose logs indicate a connection to computer B at the right time, whose logs lead to C, etc. etc. (This bars other detection methods like flat-out hacking the endpoint - doable but only if you already suspect a specific target).
So if computer C is set (by Britany) to be connecting to Britany's number, which is connected to the network on computer D, if the connection works at all (which is the first question), there'd be no IP address association between computers C and D - the data would, as far as normals think, seemingly just disappear into the aether.
A related question - if this method works, would data acquired in this way be able to be presented to normals? (Someone asked this IC'ly so Rita might think to test it)