You are viewing a single comment's thread.

view the rest of the comments →


[–] dayofthehope 2 points 13 points (+15|-2) ago  (edited ago)

What do you know about how weaponized CP posters operate? Do they operate from certain IP ranges? Do they use people's computers (for example, thorugh some kind of malware)? Do they spoof ip addresses at the router level?


[–] Native 0 points 8 points (+8|-0) ago 

Im sure if he knew he wouldn't say so that the CP posters couldn't come up with new tricks