Anonymous ID: ee65ab Feb. 22, 2019, 10:09 p.m. No.5341396   🗄️.is 🔗kun   >>1725 >>1741 >>1881 >>2056

moar on the group doxing twitter users parent company is scout.ai

 

also

 

https://gizmodo.com/machine-learning-president-designers-have-no-idea-how-t-1827120746

 

the joint venture with tech dirt is apparently a sim used to train new recruits at pickle factory. gizmodo had to foia as much pic related

Anonymous ID: ee65ab Feb. 22, 2019, 10:18 p.m. No.5341480   🗄️.is 🔗kun

>>5341408

fwiw i understand field mcconnel is likely a controlled op. however the dns root attack lends credibility to the notion that someone has the certs to credential their way in. didnt mcconnell originate the idea that the clintons have had CAs since way back in the 90s. i was on here night fag posted he was seeing mismatched creds. next day i found krebs writeup and brought it to boards attention. someone actually said it wasnt important. (I knew it was major critical thinking and all) That shill convinced me ssl anon was probably right. as far as the notion of them being people with legit CAs acting nefariously, wouldnt a company want to own up to spearphishing if the alternative is " I have no clue how they got in"?

Anonymous ID: ee65ab Feb. 22, 2019, 10:37 p.m. No.5341754   🗄️.is 🔗kun   >>1786

>>5341586

problem is they really didnt draw any conclusion or state any hypothesis with which to set a null against for rejection/ failure to reject. in other words its not applying the scientific method but using analytical stats and jargon to encapsulate a list of users, and provide something for the media to sieze upon

Anonymous ID: ee65ab Feb. 22, 2019, 10:43 p.m. No.5341818   🗄️.is 🔗kun   >>1884

>>5341786

oh the dns attack… sorry mixed my diggs up. essentially the attacker logs into the root dns server node and replace the real Cert Auth1 with its Cert Auth2. when the browser checks it it shows the padlock even though the cert is bogus because the source authenticating it is the root dns servers. it would be like someone posing as an at&t operator and you calling asking to be patched through to number x and they patch you to y then x and you have no idea. tor no good because they arent seeking to unlask they want data that users hand over thats normally encrypted unless the attacker is on the pass-througj