Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It is enough to be used as evidence, it isn't enough, by itself, to definitively prove identity. It might be enough to get a subpoena to image the computers at the IP address. From there you might find the offending material that was broadcast, VPN accounts, chat logs talking about planning it, etc...


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: