Hacker News new | past | comments | ask | show | jobs | submit login

That article contains the following "evidence" claiming this is how the leaker was unmasked:

> Armed with this evidence, the NSA was able to quickly determine who had printed the document by checking audit logs.

So no I see exactly _zero_ evidence in that article that this was the method used. If you have any other article that has such evidence, I'm all ears.

Of course you're correct that The Intercept should have taken more care in this matter, but that doesn't mean that this was the reason why the leaker was found. The leaker should also have been a bit less amateur (e.g. not communicating with The Intercept on a _work_ computer).




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: