>>825696
Reposting for morning shift.
What a shit storm I came home to. Been reading stuff and looking around for about an hour now…. Q locked out of /GA/ and just got the update from CM that it's not on 8ch side.
Happened to find this post which pretty much explained what happened:
But after reading CM updates from what I gather from this post is that there's a network server that got hacked upstream of 8ch from my understanding.
Looks like shit is happening SOON from other crap that's getting posted here.
Amazing times to be alive! Hope that Q has a mil level security team working for him getting shit done… THEY are getting desperate!
>>822865
repost follows
In the Q drop where he talks about a sniffer and CM being blocked from GA what he means is that someone hacked into the network where 8ch.net is hosted. They installed a sniffer on the network, probably on a compromised server, and then they probably hacked a network switch connected to the 8chan server, to send a copy of all packets to the comped server. This is a feature that all network switches have for debugging network issues.
Once they get a copy of all incoming network traffic destined to 8ch.net, they can look for specific clicks and specific post commands. For instance maybe when CM logs in he uses a different destination URL because he is CM. EVen if the password or tripcode is fully encrypted, the browser still send the URL address in plain text. If they can distinguish CM's traffic from other people's then they can mess with it in one of two ways.
If they are relaying all the traffic to 8ch.net this is a man-in-the-middle attack where they probably just don't send CM's clicks and posts to the server. Or, if they really are sniffing a copy of traffic, they can still disrupt things. For instance, if CM has a special login that gives him extra powers, he would click a button, then fill in a password and then that is sent to the server. One click, a pause for entering text, and one post. If they see the click and then immediately post a garbage password, then CM's password post will never get to the server.
These are the kinds of things that you can do with a sniffer. Very, very few attackers will go to this trouble which is why most servers nowadays are in public data centers. But there are ways to protect against this which is why military and government servers are installed in separate data centers from the rest of us.
And, of course, one possibility is for a military network security team to go to the data center where 8ch.net is located and help them improve their level of security, at least for 8ch.net. If the hackers cannot crack the network switch serving 8ch.net, they can't do any of this. So hardening or replaciing a switch is a definite possibility.