Trump social media site brought down by Iran hackers
-
What innocent Americans are you talking about? If trade ships are attacked, maybe. If it's military personnel, none of them are innocent as they are still "following orders".
schrieb am 24. Juni 2025, 02:00 zuletzt editiert vonTankie fucktoid alert
-
America borrowed a washing machine from America to troll America? I don't get it.
schrieb am 24. Juni 2025, 02:30 zuletzt editiert vonWhoah whoah there, front or top loading?
-
The freedom of both women and the general public is not solely dictated by healthcare and the ability to attain higher education.
Does a free society cut off country wide access to the external internet?
Iran is actively lying to its citizens saying they destroyed the US base in Qatar and there was minimal damage to Iranian nuclear facilities. Both outright lies. This is not a free golden society.
How many women are persecuted from laws around the head dressing and other clothing related issues.
Boiling womens rights down to they can become an engineer and have good healthcare is laughably pathetic and on the verge of being a conservative talking point I would hear on fox news in justification for stripping away more rights. Pinning the struggle of US women against Iranian women is an incredibly pathetic mindset that only fosters negativity.
schrieb am 24. Juni 2025, 09:04 zuletzt editiert vonLOL you're so bad at propaganda.
"The freedom of both women and the general public is not solely dictated by healthcare and the ability to attain higher education"
I never said that, just mentioned one of those still important facts to show they're better than the US of which I could also mention many more horrible facts.Freedom is also not defined by wearing a heascarf or not.
Neither does your cherrypicking about access to the external internet.
A temporary measure in time of war, is that the best you got?And just check my comments from yesterday , turns out I was 100% right.
Iran did indeed a symbolic attack on bases evacuated 5 days ago, even reported then and they gave the USSA warning.
I also said Iran needed the symbolic attack to sell to their people as revenge.
As I predicted in that comment the theatre of BOTH symbolic attacks, the USSA one and the Iranian one are over just to get the ultimate goal:
Pissrahell can have its way out of a losing war since the imaginary nuclear threat is imaginary bombed. And what do you know, just after this they have a ceasefire.
Unfortunate actually that Iran let them off the hook.
Was going great and heartwarming images from occupied Palestine.
See, you don't understand geopolitics and its optics.
But then again, that's not your job, spouting(easily debunked)crappy lies and propaganda is. -
So if the US killed those women, problem solved? I don't get your logic.
schrieb am 24. Juni 2025, 13:29 zuletzt editiert vonYou try using logic. I didn't say anything of the sort. You came up with that yourself.
-
What innocent Americans are you talking about? If trade ships are attacked, maybe. If it's military personnel, none of them are innocent as they are still "following orders".
schrieb am 24. Juni 2025, 13:30 zuletzt editiert vonSo everyone of us is guilty. Fuck you!
-
Problem?
How many innocent lives have been lost to US military action though out the world?
Collateral damage.
schrieb am 24. Juni 2025, 13:30 zuletzt editiert vonTalking about one thing but you want to talk about all the things.
-
They could revolt
schrieb am 24. Juni 2025, 13:32 zuletzt editiert vonThey could sprout wings and fly to fairy land.
-
Disabling network security and edge devices to change the properties of ingress can absolutely be a component of an attack plan.
Just like overwhelming a postal sorting center could prevent a parcel containing updated documentation from reaching the receiver needing that information.
schrieb am 24. Juni 2025, 15:32 zuletzt editiert vonI haven't heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.
But maybe there is a different mechanism I'm not aware of. How would the DDoS change the properties of ingress?
-
Iran pls hack Elon Musk's Twitter account and post "I'm a mean old Nazi who sucks ass at Path of Exile 2"
schrieb am 24. Juni 2025, 15:42 zuletzt editiert vonNot just Elon's account, shut the whole site down!
-
Yeah good thing the US respects women's autonomy and isn't being strangled by a fundamentalist religious movement that wants to force women to be nothing more than incubators, maids, and fuck toys....
schrieb am 24. Juni 2025, 15:47 zuletzt editiert vonevangelical-christian-nationalists
-
Both of you are right but there's definitely levels to how much worse it is in Iran
schrieb am 24. Juni 2025, 15:48 zuletzt editiert vonor Alabama
-
Iran pls hack Elon Musk's Twitter account and post "I'm a mean old Nazi who sucks ass at Path of Exile 2"
schrieb am 24. Juni 2025, 15:53 zuletzt editiert von...we need a hack to prove that?
-
DDoS is not hacking
schrieb am 24. Juni 2025, 15:57 zuletzt editiert vonDefine hacking.
-
It's been tried. A huge percentage of the internet runs on Amazon web services... And a massive ddos attack on that barely bumped it beyond the level of holiday shopping.
To get anywhere on "taking down the internet" they'd probably have to physically take out many sites across the globe.
schrieb am 24. Juni 2025, 16:04 zuletzt editiert vonYou say this like the hour all major SAAS went down 2 weeks ago was nothing. MILLIONS lost in business hours is not nothing.
-
I haven't heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.
But maybe there is a different mechanism I'm not aware of. How would the DDoS change the properties of ingress?
schrieb am 24. Juni 2025, 16:15 zuletzt editiert vonBy denying access to resources in a primary region, one might force traffic to an alternate infrastructure with a different configuration. Or maybe by overwhelming hosts that distribute BGP configurations. By denying access to resources, sometimes you can be routed to resources with different security postures or different monitoring and alerting, thus not raising alarms. But these are just contrived examples.
Compromising devices is a wide field with many different tools and ideas, some of which are a bit off the wall and nearly all unexpected, necessarily.
-
So everyone of us is guilty. Fuck you!
schrieb am 24. Juni 2025, 16:33 zuletzt editiert vonDon't know why do you say "everyone", I certainly didn't say that. But if you are in the military of a country that is invading other country and continue to be in the military then you are definitely not innocent(though transferring to a different location might be a compromise).
-
- Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
- Users were struggling to access Truth Social in the early morning following the alleged hack.
- As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
schrieb am 24. Juni 2025, 16:35 zuletzt editiert vonIran is kinda goated for this not gonna lie!
-
Someone should buy truth.social and make it redirect to something trump's base hates.
schrieb am 24. Juni 2025, 16:48 zuletzt editiert vonReally you should have it direct to a clone of the site, but with fake accounts pushing whatever agenda you want.
-
Define hacking.
schrieb am 24. Juni 2025, 16:53 zuletzt editiert vonI'd start with the following, and refine if necessary:
"Gaining unauthorized access to a protected computer resource by technical means."
- Port scanning --> Not hacking because there isn't any access to resources gained*
- Using default passwords that weren't changed --> Not hacking because the resource wasn't protected*
- Sending spam --> Not hacking because there isn't any access to resources gained
- Beating the admin with a wrench until he tells you the key --> Not hacking because it's not by technical means.
- Accessing teacher SSN's published on the state website in the HTML --> Not hacking because the resource wasn't protected, and on the contrary was actively published**
- Distributed denial of service attack --> Not hacking because there isn't any access to resources gained
* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn't file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily -
- Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
- Users were struggling to access Truth Social in the early morning following the alleged hack.
- As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
schrieb am 24. Juni 2025, 17:06 zuletzt editiert von nutsack@lemmy.dbzer0.comthey have to start differentiating a ddos attack from an actual breach. one is far more interesting than the other
-
AI companion apps are on track to generate $120M+ in revenue in 2025, and in H1 there were 60M downloads of this kind of app, up 88% YoY
Technology174 vor 18 Stundenvor etwa einem Tag1
-
Watermarks offer no defense against deepfakes, study suggests
Technology174 vor 21 Tagenvor 22 Tagen1
-
-
-
Student visa applicants will now be forced to make their social media accounts public
Technology 27. Juni 2025, 07:101
-
-
Anker recalls over a million power banks due to fire and burn hazards
Technology 14. Juni 2025, 06:031
-
NO KINGS! Tomorrow on Trump's birthday, we protest across the entire nation. Check the website for No Kings events near you!
Technology 14. Juni 2025, 01:442