RECENT ARTICLES
Inside Gab, the Online Safe Space for Far-Right Extremists
In late February, somebody Gab, an online safe space for white supremacists and other extremists. The hacker, who self-identifies as “JaXpArO and My Little Anonymous Revival Project,” exfiltrated roughly 65 gigabytes of data, including 4 million Gab accounts, 31,000 groups, and 39 million posts (over 100,000 of which were posted to private groups).The hacker then leaked this data, which spans the site’s launch in August 2016 until February 19, to the transparency collective Distributed Denial of Secrets. In a Gab post, the hate site’s CEO Andrew Torba DDoSecrets of hacking Gab, using...…In late February, somebody Gab, an online safe space for white supremacists and other extremists. The hacker, who self-identifies as “JaXpArO and My Little Anonymous Revival Project,” exfiltrated roughly 65 gigabytes of data, including 4 million Gab accounts, 31,000 groups, and 39 million posts (over 100,000 of which were posted to private groups).The hacker then leaked this data, which spans the site’s launch in August 2016 until February 19, to the transparency collective Distributed Denial of Secrets. In a Gab post, the hate site’s CEO Andrew Torba DDoSecrets of hacking Gab, using...WW…
Donald Trump’s Gab Account Uses an Email Address Belonging to the Extremist Platform’s CEO
Gab, the far-right social network that’s known as a safe space for hate speech, QAnon believers, Trump election fraud conspiracists, and , was . The site exploded in popularity after the January 6 insurrection when Amazon Parler, another social network used by right-wing extremists, offline, which caused Gab’s user base to explode from about 1 million users to roughly 4 million.The hacker made off with the email addresses and encrypted passwords of all 4 million of the site’s users and the content of more than 39 million posts, including everything posted to 7,632 private...…Gab, the far-right social network that’s known as a safe space for hate speech, QAnon believers, Trump election fraud conspiracists, and , was . The site exploded in popularity after the January 6 insurrection when Amazon Parler, another social network used by right-wing extremists, offline, which caused Gab’s user base to explode from about 1 million users to roughly 4 million.The hacker made off with the email addresses and encrypted passwords of all 4 million of the site’s users and the content of more than 39 million posts, including everything posted to 7,632 private...WW…
Russian Hackers Have Been Inside Austin City Network for Months
, , State-sponsored hackers believed to be from Russia have breached the city network of Austin, Texas, The Intercept has learned. The breach, which appears to date from at least mid-October, adds to the stunning array of intrusions attributed to Russia over the past few months.The list of reported victims includes the departments of Commerce, Homeland Security, State, and the Treasury; the Pentagon; cybersecurity firm FireEye; IT software company SolarWinds; and assorted airports and local government networks across the United States, among others. The breach in Austin is another apparent...…, , State-sponsored hackers believed to be from Russia have breached the city network of Austin, Texas, The Intercept has learned. The breach, which appears to date from at least mid-October, adds to the stunning array of intrusions attributed to Russia over the past few months.The list of reported victims includes the departments of Commerce, Homeland Security, State, and the Treasury; the Pentagon; cybersecurity firm FireEye; IT software company SolarWinds; and assorted airports and local government networks across the United States, among others. The breach in Austin is another apparent...WW…
Crumbling Case Against Assange Shows Weakness of “Hacking” Charges Related to Whistleblowing
The entire computer crime case against Assange is based on a brief discussion, between a publisher and source, about cracking a password — but the cracking never actually happened.By 2013, the Obama administration had that it could not charge WikiLeaks or Julian Assange with crimes related to publishing classified documents — documents that showed, among other things, evidence of U.S. war crimes in Iraq and Afghanistan — without criminalizing investigative journalism itself. President Barack Obama’s Justice Department called this the “New York Times problem,” because if WikiLeaks and...…The entire computer crime case against Assange is based on a brief discussion, between a publisher and source, about cracking a password — but the cracking never actually happened.By 2013, the Obama administration had that it could not charge WikiLeaks or Julian Assange with crimes related to publishing classified documents — documents that showed, among other things, evidence of U.S. war crimes in Iraq and Afghanistan — without criminalizing investigative journalism itself. President Barack Obama’s Justice Department called this the “New York Times problem,” because if WikiLeaks and...WW…
One Way to Prevent Police From Surveilling Your Phone
Use Signal and add a PIN code to your phone’s SIM card to help protect against spying.Federal agents from the Department of Homeland Security and the Justice Department used “a sophisticated cell phone cloning attack—the details of which remain classified—to intercept protesters’ phone communications” in Portland this summer, Ken Klippenstein. Put aside for the moment that, if the report is true, federal agents conducted sophisticated electronic surveillance against American protesters, an alarming breach of constitutional rights. Do ordinary people have any hope of defending their privacy...…Use Signal and add a PIN code to your phone’s SIM card to help protect against spying.Federal agents from the Department of Homeland Security and the Justice Department used “a sophisticated cell phone cloning attack—the details of which remain classified—to intercept protesters’ phone communications” in Portland this summer, Ken Klippenstein. Put aside for the moment that, if the report is true, federal agents conducted sophisticated electronic surveillance against American protesters, an alarming breach of constitutional rights. Do ordinary people have any hope of defending their privacy...WW…
- Total 7 items
- 1