this post was submitted on 30 May 2024
689 points (99.1% liked)
Technology
59398 readers
3166 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
What I wanna know is how companies get away with stuff like this.
Getting to the bottom of a cyber attack isn't... Impossible? It just takes resources.
You just pay random people on the internet to do it, it's fairly easy if you know where/what to ask for.
Traceable.
Just about anything is traceable. The trick is making it not worth the effort.
Ask eBay how that towing that line worked out for them.
See sending ip packets is quite a lot easier that sending pig fetuses
Yes, but far more traceable!
I mean, if eBay couldt cover entrails...