Trump social media site brought down by Iran hackers
-
So if the US killed those women, problem solved? I don't get your logic.
You try using logic. I didn't say anything of the sort. You came up with that yourself.
-
What innocent Americans are you talking about? If trade ships are attacked, maybe. If it's military personnel, none of them are innocent as they are still "following orders".
So everyone of us is guilty. Fuck you!
-
Problem?
How many innocent lives have been lost to US military action though out the world?
Collateral damage.
Talking about one thing but you want to talk about all the things.
-
They could revolt
They could sprout wings and fly to fairy land.
-
Disabling network security and edge devices to change the properties of ingress can absolutely be a component of an attack plan.
Just like overwhelming a postal sorting center could prevent a parcel containing updated documentation from reaching the receiver needing that information.
I haven't heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.
But maybe there is a different mechanism I'm not aware of. How would the DDoS change the properties of ingress?
-
Iran pls hack Elon Musk's Twitter account and post "I'm a mean old Nazi who sucks ass at Path of Exile 2"
Not just Elon's account, shut the whole site down!
-
Yeah good thing the US respects women's autonomy and isn't being strangled by a fundamentalist religious movement that wants to force women to be nothing more than incubators, maids, and fuck toys....
evangelical-christian-nationalists
-
Both of you are right but there's definitely levels to how much worse it is in Iran
or Alabama
-
Iran pls hack Elon Musk's Twitter account and post "I'm a mean old Nazi who sucks ass at Path of Exile 2"
...we need a hack to prove that?
-
DDoS is not hacking
Define hacking.
-
It's been tried. A huge percentage of the internet runs on Amazon web services... And a massive ddos attack on that barely bumped it beyond the level of holiday shopping.
To get anywhere on "taking down the internet" they'd probably have to physically take out many sites across the globe.
You say this like the hour all major SAAS went down 2 weeks ago was nothing. MILLIONS lost in business hours is not nothing.
-
I haven't heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.
But maybe there is a different mechanism I'm not aware of. How would the DDoS change the properties of ingress?
By denying access to resources in a primary region, one might force traffic to an alternate infrastructure with a different configuration. Or maybe by overwhelming hosts that distribute BGP configurations. By denying access to resources, sometimes you can be routed to resources with different security postures or different monitoring and alerting, thus not raising alarms. But these are just contrived examples.
Compromising devices is a wide field with many different tools and ideas, some of which are a bit off the wall and nearly all unexpected, necessarily.
-
So everyone of us is guilty. Fuck you!
Don't know why do you say "everyone", I certainly didn't say that. But if you are in the military of a country that is invading other country and continue to be in the military then you are definitely not innocent(though transferring to a different location might be a compromise).
-
- Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
- Users were struggling to access Truth Social in the early morning following the alleged hack.
- As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
Iran is kinda goated for this not gonna lie!
-
Someone should buy truth.social and make it redirect to something trump's base hates.
Really you should have it direct to a clone of the site, but with fake accounts pushing whatever agenda you want.
-
Define hacking.
I'd start with the following, and refine if necessary:
"Gaining unauthorized access to a protected computer resource by technical means."
- Port scanning --> Not hacking because there isn't any access to resources gained*
- Using default passwords that weren't changed --> Not hacking because the resource wasn't protected*
- Sending spam --> Not hacking because there isn't any access to resources gained
- Beating the admin with a wrench until he tells you the key --> Not hacking because it's not by technical means.
- Accessing teacher SSN's published on the state website in the HTML --> Not hacking because the resource wasn't protected, and on the contrary was actively published**
- Distributed denial of service attack --> Not hacking because there isn't any access to resources gained
* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn't file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily -
- Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
- Users were struggling to access Truth Social in the early morning following the alleged hack.
- As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
they have to start differentiating a ddos attack from an actual breach. one is far more interesting than the other
-
I'd start with the following, and refine if necessary:
"Gaining unauthorized access to a protected computer resource by technical means."
- Port scanning --> Not hacking because there isn't any access to resources gained*
- Using default passwords that weren't changed --> Not hacking because the resource wasn't protected*
- Sending spam --> Not hacking because there isn't any access to resources gained
- Beating the admin with a wrench until he tells you the key --> Not hacking because it's not by technical means.
- Accessing teacher SSN's published on the state website in the HTML --> Not hacking because the resource wasn't protected, and on the contrary was actively published**
- Distributed denial of service attack --> Not hacking because there isn't any access to resources gained
* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn't file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckilyOh man.
My comment was intended to imply that the term "hacking" defies definition because it has been grossly overused and misconstrued over many decades.
Sure you might be able to convey what it means to you but of course it means different things to everyone else, with each definition being equally appropriate.
Er go, any discussion is one of semantics.
-
The Mastodon developers then formally requested that Truth Social comply with the terms of the software license,[75] with Truth Social publishing its source code as a ZIP file on the website on November 12, 2021.
Lol they actually complied with the license in the end, i didnt know that.
Surely Trump could have ignored them, as an official act of course.
-
Iran pls hack Elon Musk's Twitter account and post "I'm a mean old Nazi who sucks ass at Path of Exile 2"
No, post an unhinged rant where he doesn't say he's a nazi, but he talks in detail about how he sucks at video games phrased as bragging, then shits on gamers for noticing, and says a buncha shit like the 14 words and junk.
-
-
Republican National Convention Sued for Sending Unhinged Text Messages Soliciting Donations to Donald Trump’s Campaign and Continuing to Text Even After Trying to Unsubscribe.
Technology1
-
The Guardian, in collaboration with the University of Cambridge, launches new open-source Secure Messaging technology
Technology1
-
-
Google Restricts Android Sideloading—What It Means for User Autonomy and the Future of Mobile Freedom – Purism
Technology1
-
-
-