Given the typical pattern of: phishing -> intelligence_collection -> official_investigation -> prosecution I would like to make few OpSec related notes. The aim of this article is to educate and start the discussion about OpSec.
From the text in Darknetlive it seems that the Operator allowed...