Before Tor, VPNs and proxy services, how did cybercrimals remain anonymous?
I have read that they used previously breached machines, but to try to gain access to those machines they also needed some kind of protection right? How did they do it then?
Continue reading Before Tor, VPNs and proxy services, how did cybercrimals remain anonymous?