[EMAIL PROTECTED] wrote:
>
> Wouldn't the time of the hack be pretty well known and wouldn't the RPI
> firewall logs be timestamped or am I naive?
>
most likely that was a failed case of the assumption that the criminal
always returns to the site of the crime.
Read the article. Of course the time is well known, and the logs
are stamped. You are naive, though, if you beleive that will stop
an LEA from trashing the lives of innocents...
...and of course they'll get away with it.
Peter
[Now, I'm not excusing the FBI's jackboot tactics in this case,
but