@Moon @graf @sandwich @yockeypuck Yeah I also work with a lot of Chinese-Americans and I doubt any of them are spies lol.
In this specific instance, it seems like Li is in fact a spy though. Chen was her asset and Greschner is co-opted. Sold his soul for some big contracts. This part made me perk up my ears:
Greschner said he and Li were out of town and unaware of what happened until days later. Greschner made his way to Fan’s rental home and powered on the Hummingbird computers that Fan had left behind. The drives were so thoroughly erased Greschner said he had to reinstall their operating systems.
Why would he re-install the operating system on a computer that will obviously become evidence in a spying / data exfiltration investigation? Seems like tampering and aiding a coverup to me. I wonder how that affected the chances of forensic data recovery.
Did you know the latest version of Bastille now includes a convenient `setup` command?
The setup sub-command can configure your networking (bastille0), firewall
(pf.conf) and ZFS configuration automagically.
I honestly can't believe it has token this long to include that. That's my bad lol.
In Bastille v0.10.20230714+ check out:
bastille setup -h
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.