this post was submitted on 19 Nov 2024
257 points (98.5% liked)

politics

19118 readers
4021 users here now

Welcome to the discussion of US Politics!

Rules:

  1. Post only links to articles, Title must fairly describe link contents. If your title differs from the site’s, it should only be to add context or be more descriptive. Do not post entire articles in the body or in the comments.

Links must be to the original source, not an aggregator like Google Amp, MSN, or Yahoo.

Example:

  1. Articles must be relevant to politics. Links must be to quality and original content. Articles should be worth reading. Clickbait, stub articles, and rehosted or stolen content are not allowed. Check your source for Reliability and Bias here.
  2. Be civil, No violations of TOS. It’s OK to say the subject of an article is behaving like a (pejorative, pejorative). It’s NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
  3. No memes, trolling, or low-effort comments. Reposts, misinformation, off-topic, trolling, or offensive. Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
  4. Vote based on comment quality, not agreement. This community aims to foster discussion; please reward people for putting effort into articulating their viewpoint, even if you disagree with it.
  5. No hate speech, slurs, celebrating death, advocating violence, or abusive language. This will result in a ban. Usernames containing racist, or inappropriate slurs will be banned without warning

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.

That's all the rules!

Civic Links

Register To Vote

Citizenship Resource Center

Congressional Awards Program

Federal Government Agencies

Library of Congress Legislative Resources

The White House

U.S. House of Representatives

U.S. Senate

Partnered Communities:

News

World News

Business News

Political Discussion

Ask Politics

Military News

Global Politics

Moderate Politics

Progressive Politics

UK Politics

Canadian Politics

Australian Politics

New Zealand Politics

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] partial_accumen 5 points 2 days ago (1 children)

Skip the middle men and just start leaving shit in insecure places you want the press to get, I say.

Should we call these Honeypot leaks? Create a server running on completely unpatched Windows XP then put what you want leaked, then attach it raw dog to the internet without any kind of firewall.

[–] just_another_person 1 points 2 days ago (1 children)

Well then you're still respotfor pointing people to it somehow. I say claiming "hackers gave it to me" is much simpler.

[–] partial_accumen 2 points 2 days ago (1 children)

Well then you’re still respotfor pointing people to it somehow.

There's no need to point it out. Hundreds of hacker scanners are running all the time across the internet looking for unpatched Operating Systems with known exploits. These are automatic by the hackers because the flaws are well documented.

Imagine being told that there is one person in the world that will give you a million dollars cash and the only thing you need to do is ask them to give you the money. Now, imagine you have the phone numbers for every single person. It is trivially easy to set up a computer script that will go through the entire list and send each phone number a txt message asking them to give you the money. You'd start up this process and never have to revisit it except to check ever few weeks if someone responded that they'll give you the money.

This is how the hacker exploit scripts work. So for my example above, if I wanted my Windows XP computer hacked, I just need to leave it unpatched and plug it into the internet without any firewall. The hacking literally takes only 10 minutes for your Windows XP computer to be hacked.

[–] just_another_person 0 points 1 day ago (1 children)

Totally not how that works.

Like you think "hackers" are just scanning the entire Internet like in Matrix world and stumbling on stuff?

Lelz

[–] partial_accumen 3 points 1 day ago (1 children)

Totally not how that works.

Its not the ONLY way how it works, but it absolutely can work that way.

Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

You don't have to take my word for it. You can, like, read the article I posted where they detail another IT professional went through the steps and recorded actual results. Is clicking on the link and reading too difficult because you're too busy with "Lelz"?

[–] just_another_person -1 points 1 day ago (1 children)

By your logic:

  1. The Gaetz situation is in the news.
  2. "hackers" start scanning the entire Internet
  3. ?????
  4. "hackers" find an unsecured machine as you suggest that just happens to have the documents they want
[–] partial_accumen 1 points 1 day ago (1 children)

By your logic:

No, not by a long shot.

I am responding directly to your statement from your OP:

Skip the middle men and just start leaving shit in insecure places you want the press to get, I say.

I'm saying the person with the data they want leaked can create the insecure place where they know it will get picked up but still maintain plausible deniability. I'm agreeing with you.