--Britboy Attempts To Redpill the Schizofags General--
To all the schizofags who seems to believe the SSH/emails leaks are genuine consider this:
- We are in lock down so consider the fact that people have a LOT of free time to use a simple web scraper, compile emails from the employees of these 5 institutions (WHO, CDC, World Bank, Bill Gates Foundation, NIH) which are public on the internet, compile these emails into an excel file along with a password dictionary and then create a txt file.
- I noticed an image showing somebody logging into a WHO employee's account without further images of the contents of the account. This could easily have been made using inspect element which is what I loved messing around with AS A KID.
- The 5 institutions would not store passwords in plain text and it is very easy to hash passwords so that a leak would not show anything. Even I've done it and I'm an 18 year old and I'm sure many people on here know how to create a basic login system. They would also have a team of lawyers and calls to the CIA/FBI would be very easy as these are institutions with confidential information.
Question everything, I understand there is a collective agenda on here but a lot of the times it can just be bait.
Did you not see the thread on best/pol/? The first user was trying to upload what he was finding. His last post was a picture of a bunch of police trucks infront of his house. Who logins lead to 2016 pages with basic info. Wulab logins lead to nothing and gateafoundation lead to nothing, so far.
Adam Green
I mean they did literally leak it. Weather or not they leaked it or its fake, they would have to arrest them to question them. Its like calling the police or going online saying I murdered someone when you didn't.
Aaron Davis
Oh yeah, thinking about the GDPR stuff, you have 72 hours to notify your users about leaks, and when that gets notified, they will be quite a lot over the news by then and then we could know if it was real or not.
Parker Thompson
Things did happen and plenty of info was gathered. It's just a big clusterfuck held together with twigs and chewing gum. Read the thread.
Gabriel Ross
Do you have anything more to add?
Easton Cox
I have read the thread and have even compiled every information I could get my hands on into a zip file. I agree it isn't very well connected but I just want to state how there is still a possibility for these SSH/email logins to be fake.
Andrew Miller
he said that the cops were after a meth house later in the thread, he's fine
Landon Rodriguez
I feel like the more info gathered, the more loose it seems with how some stuff seems like you could easily fake it with inspect elements and register on websites that you could easily register on or just using website templates to imitate the website.
Benjamin James
You know the account names. You know the passwords. Log in if the sites are still up and see for yourself. No use slinging shit from the sidelines. t. shit slinger
Nathaniel Nguyen
I saw some working WHO emails with passwords and some working lab accounts.
Brayden Baker
Why on earth would I make this thread with confidence if I haven't tried it myself? I probably should have mentioned that they didn't work but it could also be mentioned that they shut down the servers but due to GDPR international law you have 72 hours to notify your users about leaks and therefore shutting down the server is expected. Either way there was only suspicion that these leaks were genuine but whether or not they were fake the institutions still have an obligation to close their services.
Jordan Garcia
Again, it could still be inspect element and the same person who logged in only changed the web template for the log in page. They did not share any content from the website.
I feel like anyone who runs a website would immediately shut down a service that potentially has been compromised to stop more attacks from happening to them.
Brody King
>memeflag ignored
James Stewart
This is the point where you go into their thread and pretend to be retarded to bait actual argument from lurkers in their thread. It both bumps and dismantles the narrative. At the time I saw your thread it was directly next to their email larp on the catalog.
Carter Carter
As somebody who runs a website, if there are malicious people are attempting to compromise the data of my users, it would be wise to shut down the service and deal with the issue via banning IPs/banning bot accounts/preventing spam or however the issue can be fixed. As the WHO hold a lot of confidential data it's even more imperative that they shut down their service even if there is no concrete evidence that a compromise is occuring.
Aaron Sanchez
hey man I had to make the thread engaging in some way
You don't seem like a LARP. Assuming I want to delve into links posted alongside legitimate ones in these email threads/any other shill thread that begins dumping sketchy links amidst known safe ones do you have any advice for me other than a virtual sandbox and making sure my IP isn't obtainable?
Andrew Diaz
Maybe someone got into the logs and cleaned them up. Big bad hackerman. See you in a while if not, Interpol. Hope you shoot me. Tomorrow I drink.
Look at them cope and pretend they don't have underlying motive while toeing the line of admitting it.
Ian Morris
maybe those big important company should use a password system based on an implanted chips that can be access by a swipe of the hand
now again if one would want to impliment such a system and get face by a backlash from normies who just want to stop progress
maybe just maybe a false email leak that lead to a massive hack of those same important company could be use as a lever to show how written password are unsecure and thing of the pass, maybe just maybe the normies will see how beneficial an implant could become to protect theire precious private information
nothing is random, everything as meaning but hey what do i know im on meds!
This is a debian based linux operating system made by the same people who created tor.
Liam Hernandez
No motive other than getting (you)s. Just flipflopping for no good reason at all. Same thing every day. What would you like me to admit?
Gabriel Powell
You needn't admit outright in text what weeks of stressful effort admits for you.
Ian Davis
Thank you user. I'll be sure to research and start poking around. Some anons were running counterops yesterday and I want to learn to into it since I had done some of that in my teenage years and have a healthy appreciation for puzzles.
Isaiah Stewart
There are security keys that you can use to log into Windows. If you were to use a chip inside you, I would guess it would use NFC and with that, it would be token based like contactless cards we have today. If that's the case, anyone could come and swipe your hand with a reader and manage to log into services that are now available to the person who swiped your hand, I don't think it would necessarily be as safe as a password most of the time.