• @pop@lemmy.ml
    link
    fedilink
    English
    6320 days ago

    The article is exaggerating the guy’s setup way too much. Opsec doesn’t end at the application level… The OS (the most popular being in bed with US), ISP, tor nodes, Honeypot VPNs, so on and so on could leave a trail.

    Using telegram public groups and obfuscating a calculator as a password protection layer is hillbilly level of security.

    And i’m glad these fuckos don’t have the knowledge to go beyond App developers marketing.

    • @psmgx@lemmy.world
      link
      fedilink
      English
      520 days ago

      Goes beyond the OSI model, too. Someone has to pay for that VPN, and there has to be an entry point to getting BTC, using a 2nd hand laptop where they can prove you bought it off of someone off of Craigslist, etc.

      • @tux7350@lemmy.world
        link
        fedilink
        English
        520 days ago

        Mullvad let’s you write down an account number on a piece of paper and mail it in with cash and they’ll activate it.

    • @sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      219 days ago

      Yup, every time I read about something like this, I look at what I’m doing and it’s way overkill, and I have nothing to hide. I’m guessing there are plenty of sickos that don’t get caught because they practice half-decent opsec, but there are a ton that don’t.