Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What would it lead them to other than the user's VPN ip/Tor exit node?


It might lead to: someone who wasn't careful enough to use one of those options, identifying metadata in the file, etc




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: