Computer hacking, infrastructure and your identity