Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: who_would_fardels_bear

Well, for most of those type of illegal operations you don’t want to actually own the computing power you are using. Because then they’ll trace it right back to you and you’ll go to jail.

Hackers would much rather use YOUR and MY computing power to do those things, and leave a more twisted path for the investigators to follow when they try to trace the attacks back to their origin.


7 posted on 11/23/2022 8:21:01 AM PST by Boogieman
[ Post Reply | Private Reply | To 3 | View Replies ]


To: Boogieman

If they are used to rig elections, then there will be no tracing back by the MSM or the Swamp.


8 posted on 11/23/2022 8:23:00 AM PST by who_would_fardels_bear (What is left around which to circle the wagons?)
[ Post Reply | Private Reply | To 7 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson