• lad@programming.dev
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    2 months ago

    So, hypothetically, you find a source who leaks data to you, then claim you were sent it anonymously, then all good, you’re not the one who leaked it and the source is unknown. I slightly doubt that it works that way, but I don’t have specific cases to prove it

    • KeenFlame
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      2 months ago

      No case exists that can’t exist