jm + leaks   15

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election
RUSSIAN MILITARY INTELLIGENCE [GRU] executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept.

The top-secret National Security Agency document, which was provided anonymously to The Intercept and independently authenticated, analyzes intelligence very recently acquired by the agency about a months-long Russian intelligence cyber effort against elements of the U.S. election and voting infrastructure. The report, dated May 5, 2017, is the most detailed U.S. government account of Russian interference in the election that has yet come to light.
politics  russia  nsa  leaks  us-politics  cyberattacks  gru  hacking  elections  spear-phishing  phishing  e-voting 
16 days ago by jm
Debugging Java Native Memory Leaks (evanjones.ca)
Using jemalloc to instrument the contents of the native heap and record stack traces of each chunk's allocators, so that leakers can be quickly identified (GZIPInputStream in this case).

See also https://gdstechnology.blog.gov.uk/2015/12/11/using-jemalloc-to-get-to-the-bottom-of-a-memory-leak/ , https://github.com/jeffgriffith/native-jvm-leaks/blob/master/README.md .
debugging  memory  jvm  java  leaks  memory-leaks  leak-checking  jemalloc  malloc  native  heap  off-heap  gzipinputstream 
january 2017 by jm
Twitter CEO: 'We suck at dealing with abuse' | The Verge
'We suck at dealing with abuse and trolls on the platform and we've sucked at it for years. It's no secret and the rest of the world talks about it every day. We lose core user after core user by not addressing simple trolling issues that they face every day.
I'm frankly ashamed of how poorly we've dealt with this issue during my tenure as CEO. It's absurd. There's no excuse for it. I take full responsibility for not being more aggressive on this front. It's nobody else's fault but mine, and it's embarrassing.
We're going to start kicking these people off right and left and making sure that when they issue their ridiculous attacks, nobody hears them.
Everybody on the leadership team knows this is vital.'


More like this!
trolls  twitter  gamergate  dickc  abuse  leaks  social-media 
february 2015 by jm
The Hit Team
Fergal Crehan's new gig -- good idea!
The Hit Team helps you fight back against leaked photos and videos, internet targeting and revenge porn.
revenge-porn  revenge  law  privacy  porn  leaks  photos  videos  images  selfies 
january 2015 by jm
Riding with the Stars: Passenger Privacy in the NYC Taxicab Dataset
A practical demo of "differential privacy" -- allowing public data dumps to happen without leaking privacy, using Laplace noise addition
differential-privacy  privacy  leaks  public-data  open-data  data  nyc  taxis  laplace  noise  randomness 
september 2014 by jm
The leaked New York Times innovation report is one of the key documents of this media age » Nieman Journalism Lab
one of the world’s leading news organizations giving itself a rigorous self-examination. I’ve spoken with multiple digital-savvy Times staffers in recent days who described the report with words like “transformative” and “incredibly important” and “a big big moment for the future of the Times.” One admitted crying while reading it because it surfaced so many issues about Times culture that digital types have been struggling to overcome for years.


via Antoin. This is pretty insightful -- the death of the homepage is notable
nytimes  publishing  media  journalism  tech  internet  web  news  leaks  via:antoin 
may 2014 by jm
The MtGox 500
'On March 9th a group posted a data leak, which included the trading history of all MtGox users from April 2011 to November 2013. The graphs below explore the trade behaviors of the 500 highest volume MtGox users from the leaked data set. These are the Bitcoin barons, wealthy speculators, dueling algorithms, greater fools, and many more who took bitcoin to the moon.'
dataviz  stamen  bitcoin  data  leaks  mtgox  greater-fools 
march 2014 by jm
RTE internal memo to unhappy staff re Pantigate
'I want to reassure you that RTÉ explored every option available to it, including right of reply. Legal advice was sought and all avenues were explored, including an offer to make a donation to a neutral charity.'

And they folded. Notable lack of testicular fortitude by our national broadcaster.
fail  rte  leaks  memos  pantigate  panti-bliss  homophobia  libel  defamation  ireland 
february 2014 by jm
Even the NSA is finding it hard to cope with spam
3 new Snowden leaks, covering acquisition of Yahoo address books, buddy lists, and email account activity, and how spammer activity required intervention to avoid losing useful data in the noise
spam  spammers  nsa  snowden  leaks  anti-spam  yahoo  im  mail 
october 2013 by jm
GCHQ report on 'MULLENIZE' program to 'stain' anonymous electronic traffic
By modifying the User-Agent: header string, each HTTP transaction is "stained" to allow tracking. huh
gchq  nsa  snooping  sniffing  surveillance  user-agent  http  browsers  leaks 
october 2013 by jm
IrishLeaks
hmm, interesting to see what develops here -- reminds me of "Cogair", the original Irish anonymous-whistleblower site from the '90s
anonymous  ireland  wikileaks  leaks  whistleblowing  from delicious
april 2011 by jm
WikiLeaks Archive: A CAUCASUS WEDDING
Dagestan knows how to party. 'The main activity of the day was eating and drinking -- starting from 4 p.m., about eight hours worth, all told -- punctuated, when all were laden with food and sodden with drink, with a bout of jet skiing in the Caspian'
russia  government  politics  leaks  wikileaks  weddings  funny  dagestan  caucasus  from delicious
november 2010 by jm

related tags

abuse  anonymous  anti-spam  bitcoin  browsers  buffer-overflows  c  caching  caucasus  cloudflare  coding  cyberattacks  dagestan  data  data-leak  dataviz  debugging  defamation  dickc  differential-privacy  documents  e-voting  edward-snowden  elections  fail  funny  gamergate  gchq  government  greater-fools  gru  gzipinputstream  hacking  heap  homophobia  http  im  images  internet  interviews  ireland  james-bamford  java  jemalloc  journalism  jvm  laplace  law  leak-checking  leaks  libel  mail  malloc  media  memory  memory-leaks  memos  metadata  mtgox  native  news  noise  nsa  nyc  nytimes  off-heap  open-data  panti-bliss  pantigate  phishing  photos  politics  porn  printers  privacy  public-data  publishing  randomness  reality-winner  revenge  revenge-porn  rte  russia  security  selfies  sniffing  snooping  snowden  social-media  spam  spammers  spear-phishing  stamen  surveillance  taxis  tech  the-intercept  toread  tracking  trolls  twitter  us-politics  user-agent  via:antoin  videos  web  weddings  whistleblowers  whistleblowing  wikileaks  wired  yahoo 

Copy this bookmark:



description:


tags: