• pop
    link
    fedilink
    English
    arrow-up
    61
    ·
    3 months ago

    The article is exaggerating the guy’s setup way too much. Opsec doesn’t end at the application level… The OS (the most popular being in bed with US), ISP, tor nodes, Honeypot VPNs, so on and so on could leave a trail.

    Using telegram public groups and obfuscating a calculator as a password protection layer is hillbilly level of security.

    And i’m glad these fuckos don’t have the knowledge to go beyond App developers marketing.

    • psmgx@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      3 months ago

      Goes beyond the OSI model, too. Someone has to pay for that VPN, and there has to be an entry point to getting BTC, using a 2nd hand laptop where they can prove you bought it off of someone off of Craigslist, etc.

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 months ago

      Yup, every time I read about something like this, I look at what I’m doing and it’s way overkill, and I have nothing to hide. I’m guessing there are plenty of sickos that don’t get caught because they practice half-decent opsec, but there are a ton that don’t.