Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That is a poor analogy of the threat. Basically the problem is about attracting adversarial resources. Any suspicious activity will attract more attention and thus make it more likely the adversary will find real evidence.

I wrote up an analysis of exactly this problem last year: http://grugq.github.io/blog/2013/12/21/in-search-of-opsec-ma...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: