• @just_another_person
    link
    15 hours ago

    Totally not how that works.

    Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

    Lelz

    • partial_accumen
      link
      24 hours ago

      Totally not how that works.

      Its not the ONLY way how it works, but it absolutely can work that way.

      Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

      You don’t have to take my word for it. You can, like, read the article I posted where they detail another IT professional went through the steps and recorded actual results. Is clicking on the link and reading too difficult because you’re too busy with “Lelz”?

      • @just_another_person
        link
        04 hours ago

        By your logic:

        1. The Gaetz situation is in the news.
        2. “hackers” start scanning the entire Internet
        3. ???
        4. “hackers” find an unsecured machine as you suggest that just happens to have the documents they want
        • partial_accumen
          link
          14 hours ago

          By your logic:

          No, not by a long shot.

          I am responding directly to your statement from your OP:

          Skip the middle men and just start leaving shit in insecure places you want the press to get, I say.

          I’m saying the person with the data they want leaked can create the insecure place where they know it will get picked up but still maintain plausible deniability. I’m agreeing with you.