The next LulzSec thread!

Post » Thu Jun 23, 2011 12:59 am

i think the people from Anonymous got jealous and turned the Lulscek people in. :laugh: what i dont get is how people think they are untouchable in the world of the internet. everything is connected and you have to go through servers and you will leaves bits of data. you can hide yourself only to a certain degree. if you piss of the wrong people they will find you. the stupidest thing i heard was that you cant be found if you use proxies in countries that wont let the US government see them. does anyone actually believe that they would even bother to ask to get into those proxy servers or wouldnt they just go and hack the information themselves.

there was a news story not long ago about how the feds said they had given up on trying to get into someones laptop cause they had it encrypted. my first thought was why would you tell the world and thus the terrorists that you couldnt get into an encrypted laptop. unless, you wanted them to think that. hopefully, the stupid terrorists immediately went out and got that software to encrypt their laptops.
User avatar
Stu Clarke
 
Posts: 3326
Joined: Fri Jun 22, 2007 1:45 pm

Post » Wed Jun 22, 2011 10:26 pm

I think if I were inclined to break into computer networks and systems I'd want to draw as little attention to myself as possible. No Twitter, no website, no blogs, nothing. All of that leaves a trace, in one way or another. I'd be the ghost in the machine. Seems like they've all gone the wrong way about it.
User avatar
Scarlet Devil
 
Posts: 3410
Joined: Wed Aug 16, 2006 6:31 pm

Post » Thu Jun 23, 2011 6:32 am

I think if I were inclined to break into computer networks and systems I'd want to draw as little attention to myself as possible. No Twitter, no website, no blogs, nothing. All of that leaves a trace, in one way or another. I'd be the ghost in the machine. Seems like they've all gone the wrong way about it.

Exactly what I was trying to say earlier. But, these particular hackers must simply want attention so much that it counter acts their ability to lay low.

However, I'm confused what they want really. If it's all about "gov and corporations, bad", then how is exposing innocent bystanders personal info or directly attacking the gov and FBI to reach whatever goal they might have. It's just going to make the internet even less anonymous, more controlled by gov and we'll maybe even lose net neutrality for all.

There are some fundamental design "flaws" in the current internet architecture that could be exploited by someone with dubious motives. However, maybe some additional security measures are already coming with the transition to IPv6/IPSec, but the transition to IPv6 is going to take many many years. There's still the engineer that configures something wrong...
User avatar
daniel royle
 
Posts: 3439
Joined: Thu May 17, 2007 8:44 am

Post » Thu Jun 23, 2011 1:10 am

i wonder if any of these people are also linked with anonymous. it would be weird if two hacker groups were taken out. i agree with the other posters about their "motives" why screwing over normal people by hacking websites is good for society is just beyond me. alot of people have been forced to change passwords which can be a [censored].
User avatar
Rinceoir
 
Posts: 3407
Joined: Thu Jun 29, 2006 1:54 am

Post » Thu Jun 23, 2011 6:52 am

i wonder if any of these people are also linked with anonymous. it would be weird if two hacker groups were taken out.

Some members (Topiary, Suba among others) are allegedly ex-anonymous. Also, with their operation 'AntiSec', they have temed up with hackers that indentify with 'Anonymous' (so, some grey/blackhats).
User avatar
Stephanie Valentine
 
Posts: 3281
Joined: Wed Jun 28, 2006 2:09 pm

Post » Wed Jun 22, 2011 8:01 pm

there was a news story not long ago about how the feds said they had given up on trying to get into someones laptop cause they had it encrypted. my first thought was why would you tell the world and thus the terrorists that you couldnt get into an encrypted laptop. unless, you wanted them to think that. hopefully, the stupid terrorists immediately went out and got that software to encrypt their laptops.

http://xkcd.com/538/
User avatar
Nick Tyler
 
Posts: 3437
Joined: Thu Aug 30, 2007 8:57 am

Post » Wed Jun 22, 2011 4:03 pm

snip




A pretty awesome post. :laugh:
User avatar
Everardo Montano
 
Posts: 3373
Joined: Mon Dec 03, 2007 4:23 am

Post » Thu Jun 23, 2011 12:17 am

The Lulzsec [censored] king Sabu has a linkedin page and it is as follows:

Web Ninjas for some reason wouldn't post his personal info.
User avatar
Ronald
 
Posts: 3319
Joined: Sun Aug 05, 2007 12:16 am

Post » Thu Jun 23, 2011 12:24 am

I removed a link to somone's personal information. We ask members not to even post their own email addresses, so posting a link to some random person's linked in details, regardless of whether you think they are one of the perpetrators behind lulzsec, is not cool.
User avatar
Da Missz
 
Posts: 3438
Joined: Fri Mar 30, 2007 4:42 pm

Post » Wed Jun 22, 2011 5:12 pm

There appears to be a bit of hacker warfare going on between Anonymous and LulzSec. Ryan Cleary's personal details and IP were released on pastbin last month for all the world to see. So you gotta wonder why it took the authorities so long to track him down.

Instead of peeing around with game companies and government websites these guys ought to be exposing the banksters. They're the puppet masters...

Whatever happened to Wikileaks promised exposé of the banking crisis?

Bank of America using Private Intel Firms to Attack Wikileaks

2011-02-02

In a document titled "The WikiLeaks Threat" three data intelligence companies, Plantir Technologies, HBGary Federal and Berico Technologies, outline a plan to attack Wikileaks. They are acting upon request from Hunton and Williams, a law firm working for Bank of America. The Department of Justice recommended the law firm to Bank of America according to an article in The Tech Herald. The prosed attacks on WikiLeaks according to the slides include these actions:

  • Feed the fuel between the feuding groups. Disinformation. Create messages around actions of sabotage or discredit the opposing organizations. Submit fake documents and then call out the error.
  • Create concern over the security of the infrastructure. Create exposure stories. If the process is believed not to be secure they are done.
  • Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the servers are now in Sweden and France putting a team together to get access is more straightforward.
  • Media campaign to push the radial and reckless nature of WikiLeaks activities. Sustain pressure. Does nothing for the fanatics, but creates concern and doubt among moderates.
  • Search for leaks. Use social media to profile and identify risky behavior of employees.

User avatar
Jason Rice
 
Posts: 3445
Joined: Thu Aug 16, 2007 3:42 pm

Previous

Return to Othor Games