Non-attribution

The Nonattribution Approximation
via Jordan Drysdale, writing at the Black Hills Infosec blog, regales us with a well attributed post, detailing a fucntional non-attribution hardware and software package... Today's Must Read. Permalink ...