Highest Rated Comments


RuroniHS61 karma

Note: This is a hypothetical situation produced merely to satiate my curiosity. I do not condone any illicit activities, nor do I mean to imply that I have participated in anything similar to the scenario about to be described.

Let's say I buy a laptop, giving the store I bought it from false information. I then log onto a public wi-fi source. Let's say I have my face concealed the whole time and avoid identification via cameras. I hack into major corporations with this laptop and copy, and subsequently distribute sensitive data. I do not do this at the same location twice, and I am constantly moving. I use a random number generator to determine my next location. How would you catch me?

RuroniHS35 karma

Let's say I was publishing classified information from governments of the top 20 most powerful nations in the world and my modus operandum was "you can't catch me!" being left everywhere I visit, in combination with total anonymity. You'd basically just wait for me to slip up?

RuroniHS1 karma

How do major corporations decide how much "damage" is done via copyright violations? The numbers seem arbitrarily high.