Reply to post:

Whose line of attack is it anyway? Cyber-assault whodunnits harder than ever to solve

Grikath

Here's the thing... Nowadays "Hacking" has two distinct levels: script kiddies, and " they're digging where?!! "

Now I'm a 100% believer in the levels of autism and OCD ( besides , y'know, actual aptitude and knowledge) you need to actually find deeply buried flaws. But you're not going to tell me that people that can and find and utilise these holes and work for a "state actor" leave enough footprint to identify someone easily.

Easy to point at NORK or Russia. Any of the 5 Eyes is, of course, completely innocent, would not dare, the sheer thought, etc..

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER

Biting the hand that feeds IT © 1998–2021