The Nonattribution Approximation

via Jordan Drysdale, writing at the Black Hills Infosec blog, regales us with a well attributed post, detailing a fucntional non-attribution hardware and software package… Today’s Must Read.



*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: