Scott Charney
![Scott Charney](/assets/img/authors/unknown.jpg)
Scott Charney
attack break chain hackers information sites source straight strips throws weave
Sophisticated hackers don't attack in a straight line, ... They weave between sites. If one of these sites strips off the source information and throws it away, there can be a break in the chain for investigators.