Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Run this over IP/AC to make it even harder to trace (http://www.faqs.org/rfcs/rfc1149.html).


Nooooo, didn't you read the Discussion portion?

Audit trails are automatically generated, and can often be found on logs and cable trays.

It automatically logs everything! You'd also be able to identify people with broadband connections pretty easily.


That's so 80's. The cool kids now use Tor over dragonfly UAV's.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: