The Stratus Hackers were not born overnight. Their genesis is usually traced again on the dawn of the computer period when the online world was nonetheless a novelty.Authorities could also use subpoena power if essential. Even so, effective measures like "mixers" employed by intruders to scatter traceability and chilly wallets for offline storage c