CRITIC
img-contested
N/A
0 reviews
PUBLIC
img-contested
N/A
0 reviews

RECENT ARTICLES

Sort by:
No Rating
Inside Gab, the Online Safe Space for Far-Right Extremists

Inside Gab, the Online Safe Space for Far-Right Extremists

In late February, somebody Gab, an online safe space for white supremacists and other extremists. The hacker, who self-identifies as “JaXpArO and My Little Anonymous Revival Project,” exfiltrated roughly 65 gigabytes of data, including 4 million Gab accounts, 31,000 groups, and 39 million posts (over 100,000 of which were posted to private groups).The hacker then leaked this data, which spans the site’s launch in August 2016 until February 19, to the transparency collective Distributed Denial of Secrets. In a Gab post, the hate site’s CEO Andrew Torba DDoSecrets of hacking Gab, using...

March 15, 2021
Share
Save
Review
No Rating
Donald Trump’s Gab Account Uses an Email Address Belonging to the Extremist Platform’s CEO

Donald Trump’s Gab Account Uses an Email Address Belonging to the Extremist Platform’s CEO

Gab, the far-right social network that’s known as a safe space for hate speech, QAnon believers, Trump election fraud conspiracists, and , was . The site exploded in popularity after the January 6 insurrection when Amazon Parler, another social network used by right-wing extremists, offline, which caused Gab’s user base to explode from about 1 million users to roughly 4 million.The hacker made off with the email addresses and encrypted passwords of all 4 million of the site’s users and the content of more than 39 million posts, including everything posted to 7,632 private...

March 3, 2021
Share
Save
Review
No Rating
Russian Hackers Have Been Inside Austin City Network for Months

Russian Hackers Have Been Inside Austin City Network for Months

, , State-sponsored hackers believed to be from Russia have breached the city network of Austin, Texas, The Intercept has learned. The breach, which appears to date from at least mid-October, adds to the stunning array of intrusions attributed to Russia over the past few months.The list of reported victims includes the departments of Commerce, Homeland Security, State, and the Treasury; the Pentagon; cybersecurity firm FireEye; IT software company SolarWinds; and assorted airports and local government networks across the United States, among others. The breach in Austin is another apparent...

December 17, 2020
Share
Save
Review
No Rating
Crumbling Case Against Assange Shows Weakness of “Hacking” Charges Related to Whistleblowing

Crumbling Case Against Assange Shows Weakness of “Hacking” Charges Related to Whistleblowing

The entire computer crime case against Assange is based on a brief discussion, between a publisher and source, about cracking a password — but the cracking never actually happened.By 2013, the Obama administration had that it could not charge WikiLeaks or Julian Assange with crimes related to publishing classified documents — documents that showed, among other things, evidence of U.S. war crimes in Iraq and Afghanistan — without criminalizing investigative journalism itself. President Barack Obama’s Justice Department called this the “New York Times problem,” because if WikiLeaks and...

September 30, 2020
Share
Save
Review
No Rating
One Way to Prevent Police From Surveilling Your Phone

One Way to Prevent Police From Surveilling Your Phone

Use Signal and add a PIN code to your phone’s SIM card to help protect against spying.Federal agents from the Department of Homeland Security and the Justice Department used “a sophisticated cell phone cloning attack—the details of which remain classified—to intercept protesters’ phone communications” in Portland this summer, Ken Klippenstein. Put aside for the moment that, if the report is true, federal agents conducted sophisticated electronic surveillance against American protesters, an alarming breach of constitutional rights. Do ordinary people have any hope of defending their privacy...

September 25, 2020
Share
Save
Review
  • Total 7 items
  • 1
OUTLETS
theintercept.com

theintercept.com

CRITIC
img-trusted
94%
PUBLIC
img-contested
55%