Professionals told Cobrapost on camera how they cover their tracks using offshore IP addresses or servers to upload content.
They also use proxy codes, or simply hack others' computers. They often use assembled laptops and disable tracking devices. Job done, the machines are destroyed. These tricks leave no tell-tale signs.
Latest India News