GSC has been hacked
Inge:
There was also apparently an anti-gay element to the GSC hack (the name change), so it would be interesting to look back at anything ATWA has posted and see if that fits her persona. Normally women are more tolerant of male homosexuality than men, especially very young ones.
rufio:
Yes, but this is Atwa we're talking about.
Scotty:
I must live under a rock, because I've never heard of ATWA before this all happened.
J. M. Pescado:
Quote from: Johan on 2010 January 11, 22:02:14
Given the purpose of the petition i would imagine someone from TSR would be the last person to get access to it.
I believe it was established that the password was not from TSR in this case to?
I don't believe anything was really firmly established about the passwords in this case, because the person in question has been dead for a very long time and this event was roughly contemporaneous with the original Buggybooz incident, IIRC.
Quote from: Johan on 2010 January 11, 22:02:14
You're wrong about when we denied responsibility, that was done after Coconut had accused us of it, a couple of days after if i remember correctly.
You're probably right about Coconut not having the technical assets to get access to the petition by some kind of hack though.
Would it be very unlikely that someone just gave it to her? She could at least put it to some use.
Unlikely, given that I have explicitly ordered no such actions be taken. It would serve absolutely no purpose, given that the from a strategic standpoint, such an act has no value.
Quote from: Johan on 2010 January 11, 22:02:14
You seem to be quite sure about the rouge TSR operator and while i won't completely disregard that possibility there is reason to look elsewhere to. Especially considering what was found when me and Delphy investigated the Buggybooz incident, there was a very distinct trail leading elsewhere.
There wasn't so much a "distinct trail leading elsewhere" as a "lack of smoking gun". Delphy is unwilling to do anything without a level of proof suitable for a legal prosecution. As we are not interested in legal prosecution, we simply don't need that. It is enough that I recognize the signs. The information used could not really have come from anywhere else, and you have already admitted that the information was stored in a form that was easily accessible. Such attacks in the community had been completely unheard of until that point, and the fact that attacks of the same pattern continue to appear sporadically following that incident suggests that the list continues to be in use, even if it is not being updated anymore.
Quote from: Johan on 2010 January 11, 22:02:14
Either way i would certainly want to know based on things that can be verified ant not just theories.
It should be possible to find out if an email also used on TSR that has the same/similar password could have been used to recover a password for example.
In that case it might be possible to get a list of previous logins to see from what IP they came (at least if it's webmail).
Sure, it would be "possible" to find out. All you have to do is hit the "lost password" button on any website, and most standard software will contact the email with a reset link. You know this, I know this, everyone knows this. Of course, unless you want to hack someone's account merely to prove an obvious, known fact, this line of inquiry serves no useful purpose.
Grimma:
May I just note that the fact that Johan came Whiteknighting as soon as whispers of "Hey, this reminds me of that incident in 200whatever, remember that, we still think that was TSR based on what we know, this looks very much like that did" started has completely re-assured me that there is, in fact, no TSR involvement. At all. Because they said so. Definately. Just like last time. And the time before that. And the time before that.
Navigation
[0] Message Index
[#] Next page
[*] Previous page