Given over two years of data, I wonder if you could run some kind of writing analysis against the attacker’s messages to identify who they might be. Presumably they have participated in communities under other identities, since they clearly had open source contribution experience.
Given over two years of data, I wonder if you could run some kind of writing analysis against the attacker’s messages to identify who they might be. Presumably they have participated in communities under other identities, since they clearly had open source contribution experience.