313 Team says they have resumed their attack.
I can confirm Goodreads is offline.
313 Team says they have resumed their attack.
I can confirm Goodreads is offline.
Lawfare has obtained and published transcripts from the Fulton County grand jury which investigated Donald Trump's attempts to overturn the 2020 election.
Behind CloudFlare (no alternative available): https://www.lawfaremedia.org/projects-series/testimony-heard-by-the-trump-grand-jury-in-fulton-county
I was reading this story (https://www.rawstory[.]com/trump-2676869375/), and noticed this:
Informally known as the “Doomsday Book,” Taylor explained that the secret book is secured in a location “known to only a handful of people,” and was created under the Eisenhower administration “to keep the country running if Washington was destroyed in a nuclear strike.”
The words "Doomsday Book" are linked to...https://archive[.]is/o/MBaLl/https://www.vanityfair.com/news/2023/06/it-will-be-a-revenge-machine-why-a-second-trump-administration-would-be-much-worse
That Vanity Fair article is linked in the iNews article which Raw Story's piece is based off of.
So, what this means is that the author of the Raw Story article used archive.today to read the iNews piece.
We actually can confirm this.
If we break down the URL, it has these parts:https://archive.is/o/[id of archived page]/[URL on archived page]
archive.today modifies all the links on archived pages to go through this redirect.
So the URL on the archived page is https://www.vanityfair.com/news/2023/06/it-will-be-a-revenge-machine-why-a-second-trump-administration-would-be-much-worse
And the archived page containing that URL is https://archive[.]is/MBaLl
Which is the iNews article. And the iNews article has a paywall.
So, journalists are using archive.today to bypass paywalls on other news websites.
Here is an archived copy of the article before it gets fixed: https://web.archive.org/web/20260508150858/https://www.rawstory.com/trump-2676869375/
RE: https://infosec.exchange/@iampytest1/116539509905680953
Threat Intelligence people who follow this type of thing:
How creditable is 313 Team in your experience?
Have they claimed responsibility for attacks they didn't commit before?
Or are the attacks they claim responsibility for generally confirmed?
I genuinely am curious; I lack the expertise and information to critically evaluate 313 Team's claims.
I know there are people who have been tracking them and similar groups for a while, and who have a way better idea of their credibility.
This week is finals week for many colleges and universities; it is unclear how they intend to handle this outage.
BREAKING NEWS
313 Team has taken down Canvas, a learning management system used by many school districts and universities.
According to a post in 313 Team's Telegram channel, the attack is scheduled to continue for four hours.
I have independently confirmed Canvas is down.
I reached out to 313 Team for comment, and am awaiting a response.
RE: https://infosec.exchange/@wdormann/116533862391306228
For those who don't want to go to archive.today, here is a copy of M$'s incorrect documentation: https://iam-py-test.github.io/security_research/[archive.ph%20MgBI8]%20Internet%20Shortcuts%20-%20Win32%20apps%20_%20Microsoft%20Learn.pdf
Captured from archive.today
RE: https://infosec.exchange/@iampytest1/116518730690056225
A request for comment sent to abuse@beamed.su was unsuccessful.
According to my email provider, multiple attempts to send the email resulted in the error:
abuse@beamed.su: connect to beamed.su[104.21.75.211]:25: Connection timed out
I am going to reach out for comment via Telegram.
Do you need to be a genius to figure out that children will just steal their parent's ID?
Heck, most parents would probably just give their ID to their kid, no questions asked.
Especially if the kid screams and complains.
According to a report, children were trivially able to circumvent age verification by stealing their parent's ID or drawing facial hair onto their face.
46% of children surveyed viewed age verification measures as easy to bypass.
Moreover, as one parent interviewed said:
“Kids don’t know the difference between a genuine website and a website that isn’t genuine. If all websites have facial verifications [sic] and they go on a website that is not genuine, their face and their documents could be used to do illegal stuff.”
I personally wouldn't limit that to children; adults are pretty easy to fool.
RE: https://infosec.exchange/@iampytest1/116522456988105595
We’re also adding visual analysis as a new technique to aid our detection efforts. This technology allows our AI to scan photos and videos for visual clues about a person’s age that text might miss.
What happens if I - and adult - post a (consensual) photo of my kid on my social media? Does that make me a kid?
Either I'm missing something or Meta didn't think this through.
Can I circumvent this by posting a ton of stock photos of adults and then an occasional photo of me (if I were a kid, which I'm not)?
Our AI looks at general themes and visual cues, for example height or bone structure, to estimate someone’s general age
Does this have any basis in science?
I almost failed my high school biology class and never took one in college, so I'm not exactly qualified to speak on human anatomy. That said, I'm skeptical and it seems others on Fedi are as well.
To beamed.su: I remain open minded.
Please respond 
I might write a hit piece on you in five months... wait, wrong DDoS.
RE: https://infosec.exchange/@iampytest1/116518708785669528
I reached out to beamed.su for comment regarding 313 Team's alleged use of their systems, and am awaiting a response.
RE: https://infosec.exchange/@mttaggart/116518022621367937
We offer bypasses for a wide range of CDNs and firewalls, such as Cloudflare
server: cloudflare
It seems Mozilla is now pushing their VPN through Firefox, integrating it into the browser and offering a limited amount of bandwidth for free per a month.
If I wanted to hide my IP address while browsing, I would use Tor (and do use Tor), which is more private than any VPN.
I also wonder how securely implemented this is. VPN browser extensions are extremely vulnerable to leaks and are basically garbage, but this is implemented into the browser, so maybe - hopefully - it is less vulnerable to leaks.
@deviantollam on school security hardware at ISC West.
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
(www.youtube.com)
I personally liked the ISC content; I found it informative and not just shilling for the companies, though I get not everyone agrees with me.
For those who don't get it, at the end of the Lord of the Rings, Saruman (calling himself Sharkey) takes over the Shire, and exploits the hobbits for his own personal profit. All which is good in the Shire is destroyed or co-opted for Sharkey's benefit.
One hobbit, Ted Sandyman, sides with the oppressors to his own personal benefit.
Sharkey is eventually attacked by his own disgruntled employee before the hobbits can deal with him. Being an immortal being, he doesn't die, but his physical form is destroyed.
Saruman was corrupted by Sauron through his Palantir (that's an oversimplification, yes I know).
RE: https://infosec.exchange/@iampytest1/116455768887330487
Ted Sandyman is wondering if he is one of the baddies.
For the last 20 years, employees could accept the intense external criticism and awkward conversations with family and friends about working for a company named after J. R. R. Tolkien’s corrupting all-seeing orb. But a year into Trump’s second term, as Palantir deepens its relationship with an administration many workers fear is wreaking havoc at home, employees are finally raising these concerns internally, as the US’s war on immigrants, war in Iran, and even company-released manifestos has forced them to rethink the role they play in it all.
Maybe the name was a hint or something.
Palantir is the type of company who would side with Saruman against the hobbits.
Maybe Palantir should remember what happened to Sharkey and his minions.
Interviews with current and former Palantir employees, along with internal Slack messages obtained by WIRED, suggest a workforce in turmoil.
WIRED (www.wired.com)
Concerning, a certain infosec training website I won't name is teaching students how to do digital forensics using an ancient version of Firefox.
The software they use wouldn't work on any version of Firefox released any time after 2017.