• partial_accumen@lemmy.world
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    3 days ago

    Totally not how that works.

    Its not the ONLY way how it works, but it absolutely can work that way.

    Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

    You don’t have to take my word for it. You can, like, read the article I posted where they detail another IT professional went through the steps and recorded actual results. Is clicking on the link and reading too difficult because you’re too busy with “Lelz”?

    • just_another_person@lemmy.world
      link
      fedilink
      arrow-up
      1
      arrow-down
      2
      ·
      2 days ago

      By your logic:

      1. The Gaetz situation is in the news.
      2. “hackers” start scanning the entire Internet
      3. ???
      4. “hackers” find an unsecured machine as you suggest that just happens to have the documents they want
      • partial_accumen@lemmy.world
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        2 days ago

        By your logic:

        No, not by a long shot.

        I am responding directly to your statement from your OP:

        Skip the middle men and just start leaving shit in insecure places you want the press to get, I say.

        I’m saying the person with the data they want leaked can create the insecure place where they know it will get picked up but still maintain plausible deniability. I’m agreeing with you.