--Britboy Attempts To Redpill the Schizofags General--

--Britboy Attempts To Redpill the Schizofags General--

To all the schizofags who seems to believe the SSH/emails leaks are genuine consider this:

- We are in lock down so consider the fact that people have a LOT of free time to use a simple web scraper, compile emails from the employees of these 5 institutions (WHO, CDC, World Bank, Bill Gates Foundation, NIH) which are public on the internet, compile these emails into an excel file along with a password dictionary and then create a txt file.

- I noticed an image showing somebody logging into a WHO employee's account without further images of the contents of the account. This could easily have been made using inspect element which is what I loved messing around with AS A KID.

- The 5 institutions would not store passwords in plain text and it is very easy to hash passwords so that a leak would not show anything. Even I've done it and I'm an 18 year old and I'm sure many people on here know how to create a basic login system. They would also have a team of lawyers and calls to the CIA/FBI would be very easy as these are institutions with confidential information.

Question everything, I understand there is a collective agenda on here but a lot of the times it can just be bait.

Attached: 34219820196_95c5f9dc2e_b.jpg (1024x768, 264.23K)

Other urls found in this thread:

who.int/sorry/en/.
extranet.who.int/ads/openid
web.archive.org/web/20181201171356/https://extranet.who.int/ads/adswebinterface/create.aspx
extranet.who.int/openid/noaccess.php
tails.boum.org/index.en.html
twitter.com/SFWRedditGifs

Did you not see the thread on best/pol/? The first user was trying to upload what he was finding. His last post was a picture of a bunch of police trucks infront of his house.
Who logins lead to 2016 pages with basic info. Wulab logins lead to nothing and gateafoundation lead to nothing, so far.

I mean they did literally leak it. Weather or not they leaked it or its fake, they would have to arrest them to question them. Its like calling the police or going online saying I murdered someone when you didn't.

Oh yeah, thinking about the GDPR stuff, you have 72 hours to notify your users about leaks, and when that gets notified, they will be quite a lot over the news by then and then we could know if it was real or not.

Things did happen and plenty of info was gathered. It's just a big clusterfuck held together with twigs and chewing gum. Read the thread.

Do you have anything more to add?

I have read the thread and have even compiled every information I could get my hands on into a zip file. I agree it isn't very well connected but I just want to state how there is still a possibility for these SSH/email logins to be fake.

he said that the cops were after a meth house later in the thread, he's fine

I feel like the more info gathered, the more loose it seems with how some stuff seems like you could easily fake it with inspect elements and register on websites that you could easily register on or just using website templates to imitate the website.

You know the account names. You know the passwords. Log in if the sites are still up and see for yourself. No use slinging shit from the sidelines.
t. shit slinger

I saw some working WHO emails with passwords and some working lab accounts.

Why on earth would I make this thread with confidence if I haven't tried it myself? I probably should have mentioned that they didn't work but it could also be mentioned that they shut down the servers but due to GDPR international law you have 72 hours to notify your users about leaks and therefore shutting down the server is expected. Either way there was only suspicion that these leaks were genuine but whether or not they were fake the institutions still have an obligation to close their services.

Again, it could still be inspect element and the same person who logged in only changed the web template for the log in page. They did not share any content from the website.

It doesn't seem like people can really log in now

Look this link: who.int/sorry/en/. Read the message

Yesterday this 2 accounts worked:

User: [email protected], Password: maxpitou
User: [email protected], Password: komotini

You directly linked it to an error page. You're meant to send the login page and see if that will direct to the error. It's basic PHP.

Attached: 1572_15.jpg (400x271, 27.61K)

extranet.who.int/ads/openid

I feel like anyone who runs a website would immediately shut down a service that potentially has been compromised to stop more attacks from happening to them.

>memeflag
ignored

This is the point where you go into their thread and pretend to be retarded to bait actual argument from lurkers in their thread. It both bumps and dismantles the narrative. At the time I saw your thread it was directly next to their email larp on the catalog.

As somebody who runs a website, if there are malicious people are attempting to compromise the data of my users, it would be wise to shut down the service and deal with the issue via banning IPs/banning bot accounts/preventing spam or however the issue can be fixed. As the WHO hold a lot of confidential data it's even more imperative that they shut down their service even if there is no concrete evidence that a compromise is occuring.

hey man I had to make the thread engaging in some way

I don't know how this really works, but before the website shut down, but from what I saw on webarchive, you are able to register here: web.archive.org/web/20181201171356/https://extranet.who.int/ads/adswebinterface/create.aspx

You don't seem like a LARP. Assuming I want to delve into links posted alongside legitimate ones in these email threads/any other shill thread that begins dumping sketchy links amidst known safe ones do you have any advice for me other than a virtual sandbox and making sure my IP isn't obtainable?

Maybe someone got into the logs and cleaned them up. Big bad hackerman. See you in a while if not, Interpol. Hope you shoot me.
Tomorrow I drink.

Also yesterday this extranet.who.int/openid/noaccess.php worked without a WHO lan.

Look at them cope and pretend they don't have underlying motive while toeing the line of admitting it.

maybe those big important company should use a password system based on an implanted chips that can be access by a swipe of the hand

now again if one would want to impliment such a system and get face by a backlash from normies who just want to stop progress

maybe just maybe a false email leak that lead to a massive hack of those same important company could be use as a lever to show how written password are unsecure and thing of the pass, maybe just maybe the normies will see how beneficial an implant could become to protect theire precious private information

nothing is random, everything as meaning
but hey what do i know im on meds!

You could install TAILS or The Amnesic Incognito Live System via this link:
tails.boum.org/index.en.html

This is a debian based linux operating system made by the same people who created tor.

No motive other than getting (you)s. Just flipflopping for no good reason at all. Same thing every day. What would you like me to admit?

You needn't admit outright in text what weeks of stressful effort admits for you.

Thank you user. I'll be sure to research and start poking around. Some anons were running counterops yesterday and I want to learn to into it since I had done some of that in my teenage years and have a healthy appreciation for puzzles.

There are security keys that you can use to log into Windows. If you were to use a chip inside you, I would guess it would use NFC and with that, it would be token based like contactless cards we have today. If that's the case, anyone could come and swipe your hand with a reader and manage to log into services that are now available to the person who swiped your hand, I don't think it would necessarily be as safe as a password most of the time.