• lad@programming.dev
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    So, hypothetically, you find a source who leaks data to you, then claim you were sent it anonymously, then all good, you’re not the one who leaked it and the source is unknown. I slightly doubt that it works that way, but I don’t have specific cases to prove it