Something I keep coming back to is how unusual it is that whoever is behind this has not been traced yet, especially given the amount of digital activity reportedly involved.
What makes it interesting is that the same privacy tools often discussed in cases like this are not exclusive to criminals. Journalists operating in dangerous environments regularly use encrypted communication, anonymity networks, and secure operating systems to protect themselves and their sources in life-or-death situations. Those tools are designed to reduce traceability and protect identity, not just for wrongdoing, but for legitimate safety and confidentiality.
However, even with strong privacy tools, perfect anonymity does not really exist. In most real investigations, people are eventually identified not because the technology “fails,” but because small correlations appear over time. Behavioral patterns, timing, metadata, or a single verified link between identity and activity can collapse the anonymity layer.
So the real question is not just what tools are being used, but whether investigators have found the one small connection that ties a real person to the critical timeline. In many cases, once that happens, everything else starts to align.
Just an observation for discussion.