jm + anonymous   10

How to Spot Bitcoin Inventor Satoshi Nakamoto | MIT Technology Review
Emin Gün Sirer pours cold water on the "Craig Wright is Satoshi Nakamoto" theory
satoshi-nakamoto  bitcoin  anonymous  nom-de-guerre  crypto 
december 2015 by jm
Your anonymous code contributions probably aren't
Scraping the work of successful contributors to the Google Code Jam competition, the researchers found that a mere eight training files with 70 lines of code each were enough to identify authors based in their syntactic, lexical, and layout habits.
anonymous  coding  open-source  google-code-jam  research  fingerprinting 
january 2015 by jm
"Looks like Chicago PD had a stingray out at the Eric Garner protest last night"
Your tax dollars at work: Spying on people just because they demand that the government's agents stop killing black people. [...] Anonymous has released a video featuring what appear to be Chicago police radio transmissions revealing police wiretapping of organizers' phones at the protests last night the day after Thanksgiving, perhaps using a stingray. The transmissions pointing to real-time wiretapping involve the local DHS-funded spy 'fusion' center.
imsi-catcher  stingray  surveillance  eric-garner  protests  privacy  us-politics  anonymous  chicago  police  wiretapping  dhs 
december 2014 by jm
QuakeNet IRC Network- Article - PRESS RELEASE: IRC NETWORKS UNDER SYSTEMATIC ATTACK FROM GOVERNMENTS
QuakeNet are not happy about GCHQ's DDoS attacks against them.
Yesterday we learned ... that GCHQ, the British intelligence agency, are performing persistent social and technological attacks against IRC networks. These attacks are performed without informing the networks and are targeted at users associated with politically motivated movements such as "Anonymous". While QuakeNet does not condone or endorse and actively forbids any illegal activity on its servers we encourage discussion on all topics including political and social commentary. It is apparent now that engaging in such topics with an opinion contrary to that of the intelligence agencies is sufficient to make people a target for monitoring, coercion and denial of access to communications platforms. The ... documents depict GCHQ operatives engaging in social engineering of IRC users to entrap themselves by encouraging the target to leak details about their location as well as wholesale attacks on the IRC servers hosting the network. These attacks bring down the IRC network entirely affecting every user on the network as well as the company hosting the server. The collateral damage and numbers of innocent people and companies affected by these forms of attack can be huge and it is highly illegal in many jurisdictions including the UK under the Computer Misuse Act.
quakenet  ddos  security  gchq  irc  anonymous 
february 2014 by jm
GCHQ slide claiming that they DDoS'd anonymous' IRC servers
Mikko Hypponen: "This makes British Government the only Western government known to have launched DDoS attacks."
ddos  history  security  gchq  dos  anonymous  irc  hacking 
february 2014 by jm
Tracing Brazil’s Guy Fawkes Masks
really fascinating, from Ethan Zuckerman:
The photo of workers making Guy Fawkes masks is something of a Rorschach test. If you’re primed to see the exploitative nature of global capitalism when you see people making a plastic mask, it’s there in the image. if you’re looking for the global spread of a protest movement, it’s there too, with a Brazilian factory making a local knock-off of a global icon to cash in on a national protest.
Because the internet is a copying machine, it’s very bad at context. It’s easier to encounter the image of masks being manufactured devoid of accompanying details than it is to find the story behind the images. And given our tendency to ignore information in languages we don’t read, it’s easy to see how the masks come detached from their accompanying story. For me, the image is more powerful with context behind it. It’s possible to reflect on the irony of a Hollywood prop becoming an activist trope, the tensions between mass-production and anonymity and the individuality of one’s identity and grievance, the tensions between local and global, Warner Bros and Condal, intellectual property and piracy, all in the same image.
anonymous  globalization  manufacturing  piracy  knock-offs  brazil  ethan-zuckerman  global  local  hollywood  capitalism 
november 2013 by jm
IrishLeaks
hmm, interesting to see what develops here -- reminds me of "Cogair", the original Irish anonymous-whistleblower site from the '90s
anonymous  ireland  wikileaks  leaks  whistleblowing  from delicious
april 2011 by jm
HBGary planned to "BLOW THE BALLS OFF OF NMAP"
'I would like to call it "B.E.S.T. Scanner" so people kind of get stuck calling it "the best scanner". We can figure out what BEST means later.' omgwtf. Is this guy 12 years old?
funny  security  humor  anonymous  scanner  nmap  hbgary  open-source  fail  idiots  from delicious
march 2011 by jm
Why did annon attack the FG website? : ireland
all signs point to 'they didn't.'  also, interesting comment in the Reddit thread: 'From a source close to the situation; the forms [on the FG site] were not being sanitised [against SQL injection attacks] at all.'  incredibly amateurish, if true
reddit  anonymous  4chan  hacks  fine-gael  fghack  ireland  politics  security  sql  exploits  from delicious
january 2011 by jm
why "anonymized" data really isn't
'Ohm notes, this illustrates a central reality of data collection: "data can either be useful or perfectly anonymous but never both."'
security  internet  politics  privacy  medicine  anonymity  datamining  anonymous  data  from delicious
september 2009 by jm

Copy this bookmark:



description:


tags: