• just_another_person@lemmy.world
    link
    fedilink
    arrow-up
    2
    arrow-down
    2
    ·
    17 hours ago

    Totally not how that works.

    Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

    Lelz

    • partial_accumen@lemmy.world
      link
      fedilink
      arrow-up
      4
      arrow-down
      1
      ·
      16 hours ago

      Totally not how that works.

      Its not the ONLY way how it works, but it absolutely can work that way.

      Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

      You don’t have to take my word for it. You can, like, read the article I posted where they detail another IT professional went through the steps and recorded actual results. Is clicking on the link and reading too difficult because you’re too busy with “Lelz”?

      • just_another_person@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        2
        ·
        16 hours ago

        By your logic:

        1. The Gaetz situation is in the news.
        2. “hackers” start scanning the entire Internet
        3. ???
        4. “hackers” find an unsecured machine as you suggest that just happens to have the documents they want
        • partial_accumen@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          16 hours ago

          By your logic:

          No, not by a long shot.

          I am responding directly to your statement from your OP:

          Skip the middle men and just start leaving shit in insecure places you want the press to get, I say.

          I’m saying the person with the data they want leaked can create the insecure place where they know it will get picked up but still maintain plausible deniability. I’m agreeing with you.