Skip to content

Minnesota Shooting Suspect Allegedly Used Data Broker Sites to Find Targets’ Addresses

Technology
75 56 1.3k
  • 135 Stimmen
    12 Beiträge
    9 Aufrufe
    T
    The worst person you know just made a great point
  • OpenAI Announces Massive US Government Partnership

    Technology technology
    9
    1
    103 Stimmen
    9 Beiträge
    22 Aufrufe
    M
    If its a repeating pattern is there ever a winner or a loser? Except for us, of course, who always lose.
  • We're Not Innovating, We’re Just Forgetting Slower

    Technology technology
    45
    1
    297 Stimmen
    45 Beiträge
    607 Aufrufe
    P
    … /results. I'm....not quite understanding you reply. I think you're trying to add on "results" to my statement of "cost/effort", but I covered "results" with my first statement of "features or functionality". So if I understand your post properly, I think your addition is simply duplicative of what I already included. Have I misunderstood what you're trying to communicate?
  • 198 Stimmen
    30 Beiträge
    449 Aufrufe
    D
    This guy gets it. And from my professional experience, Gen Z sucks at separating the two.
  • 349 Stimmen
    72 Beiträge
    898 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • 74 Stimmen
    13 Beiträge
    124 Aufrufe
    B
    This appears to just be a compilation of other leaks: https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/ Still not a bad idea to change passwords and make sure MFA is enabled.
  • 16 Stimmen
    4 Beiträge
    48 Aufrufe
    R
    Even with pirated Spotify the worsening of recommendations pushed me to pirate another service. Which is a win for Spotify, I guess.
  • 21 Stimmen
    3 Beiträge
    42 Aufrufe
    B
    We have to do this ourselves in the government for every decommissioned server/appliance/end user device. We have to fill out paperwork for every single storage drive we destroy, and we can only destroy them using approved destruction tools (e.g. specific degaussers, drive shredders/crushers, etc). Appliances can be kind of a pain, though. It can be tricky sometimes finding all the writable memory in things like switches and routers. But, nothing is worse than storage arrays... destroying hundreds of drives is incredibly tedious.