When someone attacks a website or smth how do they hide their ip during the attack? They can’t just use a vpn since they probably keep logs and if they don’t regularly do it maybe they are doing it by request of the authorities, the same goes for proxy’s and TOR would probably be too slow. How the hell do they hide it?
Source: Read More