Same story, but this one adds some more details and other links.

  • catloaf
    link
    fedilink
    English
    arrow-up
    1
    ·
    6 months ago

    Given over two years of data, I wonder if you could run some kind of writing analysis against the attacker’s messages to identify who they might be. Presumably they have participated in communities under other identities, since they clearly had open source contribution experience.