|
|
|
|
Dead People Mysteriously Support The FCC's Attack On Net Neutrality
We've noted for months how an unknown party has been using bots to bombard the FCC website with entirely bogus support for the agency's planned attack on net neutrality. Inquiries so far have indicated that whatever group or individual is behind the fake support used a bot that automatically pulled names -- in alphabetical order -- from a compromised database of some kind. Earlier this year one reporter actually managed to track down some of these folks -- who say they never filed such comments or in many instances had no idea what net neutrality even is. Earlier this year, some reporters discovered that some of the biggest fans of the FCC's myopic assault on net neutrality appear to be dead: "As the war over the fate of America's free and open internet lumbers on, it appears that opponents of net neutrality will do anything in their power to turn control of the internet over to massive telecom companies—including committing fraud. As detailed in a letter sent to the FCC Thursday morning, people are pissed that their personal information was used without their knowledge to post anti-net neutrality comments to the FCC's website, which includes at least two people who are recently deceased. Others have since continued to dig through the names used to support Ajit Pai's attack on net neutrality -- and continue to find that many of them had never visited the FCC website, had no idea what net neutrality is, or were no longer breathing. Like John Skalski of Sharpsburg, Georgia -- who back in May purportedly submitted this (factually incorrect) comment to the FCC comment proceeding. Note its content is different from the bot-generated comments that had been methodically submitted already: source: imgur.com Which is interesting because John is, well, dead: "However, if you go to his house on 11 Tee Pee Row, you will unfortunately speak to a kind person who will tell you that John has been passed away since 2016 and no one else there has the same name. Unfortunately, that is a fake public comment. I found Mr. Skalski’s obituary later: |
|
|
|
There are no conversations. |
|
|
|
|
Peter Hain |
That Sinn Fein, as I've already indicated, their leaders have already indicated that's what they want to achieve - once we get that credible statement, then we can get around the table and start to move forward, and I'm confident we can do so. |
Charles Eastman |
Indian names were either characteristic nicknames given in a playful spirit, deed names, birth names, or such as have a religious and symbolic meaning. |
Glenn Danzig |
People don't realize that they're being played by the Democratic Party and the Republican Party, but more so by the Democratic Party because the Democratic Party does not want another party in there. |
Warren Farrell |
Women are the only 'oppressed' group that is able to buy most of the $10 billion worth of cosmetics each year; the only oppressed group that spends more on high fashion, brand-name clothing than its oppressors; the only oppressed group that watches more TV. |
Richard J. Daley |
The Democratic Party is the party that opened its arms. We opened them to every nationality, every creed. We opened them to the immigrants. The Democratic Party is the party of the people. |
Drew Gilpin Faust |
I never planned my career. I never planned to be president of Harvard. People would have thought I was crazy, probably, at the age of 8 or 10 or 20, if I had said that. So what I would say to people planning their careers is to be ready to improvise. Be ready to follow up on opportunities as they unfold. |
Peter Ackroyd |
Thomas More's birth was noted by his father upon a blank page at the back of a copy of Geoffrey of Monmouth's 'Historia Regum Britanniae'; for a lawyer John More was remarkably inexact in his references to that natal year, and the date has been moved from 1477 to 1478 and back again. |
Edward Everett Hale |
If you have accomplished all that you have planned for yourself, you have not planned enough. |
Nelson Mandela |
I do not deny that I planned sabotage. I did not plan it in a spirit of recklessness nor because I have any love of violence. I planned it as a result of a calm and sober assessment of the political situation that had arisen after many years of tyranny, exploitation and oppression of my people by the whites. |
Michelle Gagnon |
I was really fascinated by some of the things happening with Anonymous, the hackers group. I don't necessarily agree with everything they've done, but I thought it was a really interesting use of technology and the fact that there's a whole group of people who can take over systems and fight things from behind the scenes. |
|
|
This is where we'll remind you that the FCC has shown no interest whatsoever in investigating any of this. Similarly, when I contacted the agency to tell them someone else had written a fraudulent comment in my name supporting the attack on net neutrality, I was told there was simply nothing that could be done. Combined with the agency's apparently fabricated DDoS attack, there's more than a few indicators that the agency is eager to malign the integrity of the public feedback period in order to try and downplay the massive public backlash to its handout to the telecom industry. Since the FCC is expected to unveil its full plan ahead of Thanksgiving for what will likely be a vote right before Christmas, contacting your lawmakers on this subject remains of utmost importance. Should the FCC decide to ignore the public and dismantle the protections anyway, it seems more than likely that thi...
This post is a comment.
|
|
|
|
When trying to exploit some website using sqlmap, its a good idea to be anonymous. Sqlmap has excellent support for using common proxies or tor.
First start tor and ensure that it is running the socks5 daemon on port 9050. Then use the socks5 proxy with sqlmap as follows
# ./sqlmap.py --tor --tor-type=SOCKS5 -u "http://www.hackable.org/view_section.php?id=10" ...
This post is a comment.
|
|
|
|
In real life, of course, I totally support your decision to climb trees to escape from lobster people.
This post is a comment.
|
|
|
|
Why are people so quick to define each other? No one is some one dimensional character labeled asshole, bitch, loser etc. The more followers you have, the more support you get for your closed mind and heart. But hearts aren't cool right.
|
|
|
|
SPs Won't Promise To Treat All Traffic Equally After Net Neutrality
An anonymous reader writes: The FCC voted to put an end to net neutrality, giving internet providers free rein to deliver service at their own discretion. There's really only one condition here: internet providers will have to disclose their policies regarding "network management practices, performance, and commercial terms." So if ISPs want to block websites, throttle your connection, or charge certain websites more, they'll have to admit it. We're still too far out to know exactly what disclosures all the big ISPs are going to make -- the rules (or lack thereof) don't actually go into effect for another few months -- bu...
|
|
|
|
Cyber attack spreads across 74 countries; some UK hospitals crippled
Cyber attacks that hit 74 countries across Europe and Asia Friday, impacting the public health system in Britain, apparently involved a leaked hacking tool from the National Security Agency.
The attack used ransomware, which is malware that encrypts data and locks a user from their data until they pay a ransom. The tool, which was leaked by a group known as Shadow Brokers, had been stolen from the N.S.A. as part of a wide swath of tools illegally released in 2016. ...
|
|
|
|
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the ...
This post is a comment.
|
|
|
|
Sweden Accidentally Leaks Personal Details of Nearly All Citizens
Another day, Another data breach! This time sensitive and personal data of millions of transporters in Sweden, along with the nation's military secrets, have been exposed, putting every individual's as well as national security at risk. Who exposed the sensitive data? The Swedish government itself. Swedish media is reporting of a massive data breach in the Swedish Transport Agency (Transportstyrelsen) after the agency mishandled...
|
|
|
|
Hacker Steals $30 Million Worth of Ethereum From Parity Multi-Sig Wallets
An unknown hacker has used a vulnerability in an Ethereum wallet client to steal over 153,000 Ether, worth over $30 million dollars. The hack was possible due to a flaw in the Parity Ethereum client. The vulnerability allowed the hacker to exfiltrate funds from multi-sig wallets created with Parity clients 1.5 and later. Parity 1.5 was released on January 19, 2017. The attack took place around 19:00-20:00 UTC and was immediately spotted by Parity, a company founded by Gavin Wood, Ethereum's founder. The company issued a security alert on its blog. The Ether stolen from Parity multi-sig accounts was transferred into this Ethereum wallet, currently holding 153,017.021336727 Ether. Because Parity spotted the attack i...
|
|
|
|
Remember students are paying thousands of dollars (some over 5 grand) to take these classes. There should be someone who's job it is to be a general piazza support assistant.
This post is a comment.
|
|