Its not the ONLY way how it works, but it absolutely can work that way.
Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?
You don’t have to take my word for it. You can, like, read the article I posted where they detail another IT professional went through the steps and recorded actual results. Is clicking on the link and reading too difficult because you’re too busy with “Lelz”?
I am responding directly to your statement from your OP:
Skip the middle men and just start leaving shit in insecure places you want the press to get, I say.
I’m saying the person with the data they want leaked can create the insecure place where they know it will get picked up but still maintain plausible deniability. I’m agreeing with you.
Its not the ONLY way how it works, but it absolutely can work that way.
You don’t have to take my word for it. You can, like, read the article I posted where they detail another IT professional went through the steps and recorded actual results. Is clicking on the link and reading too difficult because you’re too busy with “Lelz”?
By your logic:
No, not by a long shot.
I am responding directly to your statement from your OP:
I’m saying the person with the data they want leaked can create the insecure place where they know it will get picked up but still maintain plausible deniability. I’m agreeing with you.
Cool.