How do hackers really achieve "anonymity"?
- by Somebody still uses you MS-DOS
I asked if proxies really provide anonymity, and would like to know how hackers do it when they try to attack government websites and such.
They hack PCs making them zombies and them controlling them, using their victim's IP address for example? They connect to it using a VPN, what?
(I'm just curious)