Discussion about this post

User's avatar
David Thornton's avatar

From what I’ve seen, it wasn’t just a computer leak. Part of how they identified him was by identifying items in the margins of pictures of paper documents that he posted to the internet. He either had to print the documents himself (that would probably be traceable) or he picked up undestroyed documents somewhere.

https://twitter.com/trbrtc/status/1646592080293122067?s=61&t=X6XxCDIBmdrPHrSiKT5oaQ

Expand full comment
Chris J. Karr's avatar

"Of course, that's a cynical take, but I am not the only one who shares it. The folks who work day and night, who spent 20 year military careers in cyber or intelligence, aren't buying this story."

You basically have fleshed out what I've been mulling around since yesterday. I've been wondering if he was pulling documents out of a honeypot set up for him to to peruse and pull from.

Expand full comment
13 more comments...

No posts