• partial_accumen
    link
    51 month ago

    Skip the middle men and just start leaving shit in insecure places you want the press to get, I say.

    Should we call these Honeypot leaks? Create a server running on completely unpatched Windows XP then put what you want leaked, then attach it raw dog to the internet without any kind of firewall.

    • @just_another_person
      link
      11 month ago

      Well then you’re still respotfor pointing people to it somehow. I say claiming “hackers gave it to me” is much simpler.

      • partial_accumen
        link
        21 month ago

        Well then you’re still respotfor pointing people to it somehow.

        There’s no need to point it out. Hundreds of hacker scanners are running all the time across the internet looking for unpatched Operating Systems with known exploits. These are automatic by the hackers because the flaws are well documented.

        Imagine being told that there is one person in the world that will give you a million dollars cash and the only thing you need to do is ask them to give you the money. Now, imagine you have the phone numbers for every single person. It is trivially easy to set up a computer script that will go through the entire list and send each phone number a txt message asking them to give you the money. You’d start up this process and never have to revisit it except to check ever few weeks if someone responded that they’ll give you the money.

        This is how the hacker exploit scripts work. So for my example above, if I wanted my Windows XP computer hacked, I just need to leave it unpatched and plug it into the internet without any firewall. The hacking literally takes only 10 minutes for your Windows XP computer to be hacked.

        • @just_another_person
          link
          01 month ago

          Totally not how that works.

          Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

          Lelz

          • partial_accumen
            link
            31 month ago

            Totally not how that works.

            Its not the ONLY way how it works, but it absolutely can work that way.

            Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

            You don’t have to take my word for it. You can, like, read the article I posted where they detail another IT professional went through the steps and recorded actual results. Is clicking on the link and reading too difficult because you’re too busy with “Lelz”?

            • @just_another_person
              link
              -11 month ago

              By your logic:

              1. The Gaetz situation is in the news.
              2. “hackers” start scanning the entire Internet
              3. ???
              4. “hackers” find an unsecured machine as you suggest that just happens to have the documents they want
              • partial_accumen
                link
                11 month ago

                By your logic:

                No, not by a long shot.

                I am responding directly to your statement from your OP:

                Skip the middle men and just start leaving shit in insecure places you want the press to get, I say.

                I’m saying the person with the data they want leaked can create the insecure place where they know it will get picked up but still maintain plausible deniability. I’m agreeing with you.