Notices where this attachment appears
-
Embed this notice
@toiletpaper
> But Zuckerberg’s statement missed a key detail – at least three Facebook staff members participated in the Aspen Institute’s Hunter Biden table-top exercise that game-planned how to suppress the story two months in advance of the New York Post story.
Actually not so mysterious. The explicit policy is "if you get caught, just blame the government", as recommended by the government. "Externalizing the difficult responsibility of censorship" is the strategy, see this PDF (featuring a cameo by MIT Sloane psychopath and notable fedi-scraper, @Drand ): https://screamshitter.club/rvl/full/835374c1bfa10895663d4d1c94500049823ea928fb7e9c47b01a6b7f8f07c091 .
-
Embed this notice
@cjd @shakal @0 @j @dcc @mint @pernia @sun @threat @laurel
> It would be funny if this turned into a hell thread and the original posts got replicated over 9000 servers.
It's probably been dumped all over the place even before I tagged some new people in. Seems likely that this is just amateur night at the "Guys in suits that say 'cyber' on purpose" club. @ins0mniak loves those guys, they like to corner people in bars and ramble about their certifications, and now they're on fedi, too! (:helllife: There is no escape. :hellthread:) So the best audience for such a hellthread might be the people that get a kick out of watching these guys run around while Yakety Sax plays.
Maybe instead of getting "irrevocably deleted", *different* feds have already scraped and propagated it, like the fed contractor @Drand ! (Remember him from the big scraping incident detailed in the thread at https://nya.social/notes/818c3d1bdb3e20788eb08e25 , which was allegedly just an "accidental" DoS of everyone's servers to gather information on how moderation works around here, so as to further the goal of convincing people to abandon their misinformation and all the hate speeches, but turned out to be part of a project funded by the NSF to figure out viable censorship strategies and especially how to sell censorship to the public, as covered in https://docs.reclaimthenet.org/NSF-Staff-Report-rtn.pdf , which is mirrored at https://screamshitter.club/rvl/full/835374c1bfa10895663d4d1c94500049823ea928fb7e9c47b01a6b7f8f07c091 ?)
> "You are requested to irrevocably delete the following post(s) within 24 hours of receiving this email and not to make it accessible to any third party:"
I've been saying the feds don't know how fedi works. :shiggy:
I'm not certain this actually is a fed, though; see below.
> I don't speak German, but apparently this post made someone butthurt so I hereby approve of it.
It looks like a BND spy name Felix Juhl has been snooping around according to machine translation.
Good luck to Ian Watt, LLM, at the "FraudPrevention Team" at Artefaktum, LLC. You cannot get shit off fedi, especially things like "This Felix Juhl fellow is a spy", it goes everywhere faster than you can send a letter, and an LLC that has its "FraudPrevention Team" whose email address is "fraudprevention@icloud.com" is almost certainly not legit, especially someone that can't manage coherent English: "as you then knowingly allow the dissemination of untrue defamatory and defamatory statements on your platform", and "you should be aware that fake news and defamatory might lead to cort suit". Like, the C&D "order" (a court can "order", a private citizen can only issue a demand) reads like it was written by a non-native speaker that was kinda panicked. I think this is like that Web Sheriff guy from the 90s: Felix Juhl is making sockpuppets to sound official to try to get people to stop embarrassing him on the internet.
If I look at "ARTEFAKTUM LLC" ( https://www.linkedin.com/company/artefaktum/people/ ) I don't see "Ian Watt, LLM". I do see someone named "Felix J.", whose apparently got a lot of followers for someone trying to conceal his identity.
I'm very interested in what software Felix Juhl was trying to buy. According to http://demo.fedilist.com/instance/cyberplace.social , cyberplace.social is hosted by Hetzner, though whois says the server is in Finland; I don't know how jurisdiction works in the EU but I imagine that if he *could* get a court order, he'd have one.
Just while I'm here and on the topic of the Bongo-National-Dongosreich (I can never remember how to expand German acronyms, I have to copy and paste "Bundesnachrichtendienst" every single time, the language makes no sense, it is not a civilized language), every chance I get to give a summary, I give it: the BND has been up to all kinds of shady stuff: when they got popped for bothering foreign journalists ( https://rsf.org/en/worldwide-mass-surveillance-germany-s-intelligence-service-declared-unconstitutional-landmark ), they didn't actually stop, they just started laundering it through the BMBF, which is doing things like doxing Libsoftiktok by funding projects like the "Hatespeech Tracker" through the Prototype Fund: https://prototypefund.de/en/project/hatespeech-tracker/ , "a project of the Open Knowledge Foundation Germany [ https://okfn.de/en/ ], funded by the Federal Ministry of Education and Research (BMBF) [ https://www.bmbf.de/en/index.html ]" or making fake profiles on social media (as noted here, https://www.zerohedge.com/geopolitical/german-domestic-intelligence-running-100s-fake-right-wing-extremist-social-media , and mentioned in this thread by a US military intelligence agent: https://news.ycombinator.com/item?id=30528382 .) Incidentally—and I'm sure this has nothing to do with anything—Adolf Hitler, when he joined the Nazi Party, was an "education officer" for the BMBF, though he quit his job after assuming leadership of the party.
So maybe Felix is just, like, one of the lower-ranking dudes. I mean, if he's a spy, then that Uwe Klapproth guy is, too. But I'm not certain that this "Euroclear" company is legit. It's all "@gmx.de" and "@icloud.com" and this does not inspire confidence in their "Cyber Risk Management" services. Maybe this is some kind of viral marketing stunt.
1707902.pdf
c_and_d_letter_from_fucking_icloud.png
felix_juhl.png
-
Embed this notice
@fluffy @DutchBoomerMan @NonPlayableClown @SarahGation
> I've not seen any documents that describe the sort of lists that spies keep on citizens, but it is unlikely to be something I will find well-engineered.
Have a look at the XKeyscore leak.
> Looking briefly, I see that this was a controversy from 2010. I doubt anything has improved.
Indeed. So at any rate, my security posture does not change based on whether anyone notices it: the idea is to make sure that it works no matter who notices it.
> place too much faith in intsec and deeply underemphasize fundamental security practices such as compartmentalization, discretion, and inconspicuous.
Sure. I'm not banking on owning the unbreakable lock, though, just I think people throw up their hands too often. Someone can jimmy the lock or smash a window, but you lock the car door and you don't leave a pile of money in the seat.
> Discussions are often about Tor, about proxies, but you never hear anyone say to buy a second computer.
Oh, absolutely. But someone says "The ISP is selling metadata" and my response to that is "Use Tor". But as I said about the chudbuds.lol hack, that was caused by Claire and her husband using the same computer for gaming and streaming and all of the legal documents and logging into their Frantech account and everything was on one machine. I think it's good to separate those things, keep some live-boot media handy, keep a machine around that is off so you can clean-room it. If you wanna be super paranoid, the three-letter agencies had taken to intercepting electronics shipments from Amazon (but hadn't thought to get the post office or UPS/FedEx to stop *reporting* it, so people saw the package tracking go to the FBI field office and then back to the distribution center and then arrive at their house, which they have no doubt rectified by now): procuring a computer in person on a whim and paying cash avoids that problem.
> And if you read about cases such as the silk road raid,
Accurate, yes: if I recall correctly, due conducted his business on an unlocked laptop at a library and let someone else get physical access to it. There's no amount of tech that will save you from that.
> there's no point in using Tor if your browser has facebook cookies.
You think they need a cookie?
> I looked briefly online but was not able to find any details, so i hope that you can recall a hint that helps me search for more to read about.
Same XKeyscore dump, nearly every proxy service that promised anonymity got you added to the same list as the people that connected to Tor nodes. I am certain this has not changed substantially, and it's definitely worse. For example, you can be certain that riseup.net, offering a proxy service and email and all sorts of non-host-proof services for left-wing radicals to collaborate, has a 90% chance of being a honeypot, and in the off-chance that it's not a honeypot, it's been compromised. Feds have gone out of their way to avoid disclosing this sort of thing: they have been caught fabricating probable cause to avoid revealing the use of Stingrays, that was in the PRISM leaks. The cozy relationship between Facebook/Twitter/etc. and the feds came to light a couple of years ago, and they cried "The government made us do it!" and then somewhat more recently, this turns out to have been a PR maneuver concocted by the government: https://screamshitter.club/rvl/full/835374c1bfa10895663d4d1c94500049823ea928fb7e9c47b01a6b7f8f07c091 . Here's a screenshot with the relevant part, and hey--there's a picture of Drand @ techhub.social, the guy that got caught scraping the shit out of fedi five months ago. What are the odds?
It's not just the US government, either: Germany's BND was slapped by their courts for conducting widespread surveillance on foreign journalists, and then required to stop. Almost immediately after that, the BMBF started funding projects designed to combat "extremism": if you fund a project that does what you want done, that turns out to be enough degrees removed that you don't get in trouble there. So the Libsoftiktok dox, that came from Travis Brown's "Hatespeech Tracker", a project proudly funded by the BMBF ( https://prototypefund.de/en/project/hatespeech-tracker/ ). (Incidentally, when he joined the Nazi Party, Hitler was working for the education ministry and his job was monitoring extremists on behalf of the government.)
I can't tell if I'm on a list, so I can't waste time worrying whether or not I'm on a list for using Tor or nmap or whatever: best to figure out if it matters whether I'm on a list of some sort, and in cases where it matters, assume the worst and hedge. I *can* avoid a bunch of MITM-based tracking done by the ISP if I use Tor, so if someone points out that ISPs are now legally allowed to track people and to monetize that data (and if you let them monetize it, they will, so the government can rely on the ISP keeping every byte it can, and the ISP isn't going to push back against the government too hard, so the government can rely on being able to get anything it asks for), then I say "Tor" because that's the solution to that problem.
externalizing_the_difficult_responsibility_of_censorship.png
-
Embed this notice
@Herman_Hetherington @gnarley_boot
> There was a company pulling every post off TWKN feed of FSE for quite a while specifically for the feds.
That was Boardreader.com, which is owned by SocialGist. They were monitoring for threats against "Blackrock Executives".
Very recently some dickhead professor from the Sloane Business School at MIT was scraping a large number of fedi instances. He turns out to have been on fedi ( @Drand ) and he says he's really sorry and swears that it was an accident that he deliberately changed his scraper's user-agent to pretend to be a browser and then hammered the shit out of fedi. Some time later, he turns out to have shown up in the pitch deck for a grant from the NSF, he's on a team that wanted to help social media companies avoid the PR blowback when they get caught censoring "misinformation". ( https://screamshitter.club/rvl/full/835374c1bfa10895663d4d1c94500049823ea928fb7e9c47b01a6b7f8f07c091 ). There's a thread about it: https://nya.social/notes/818c3d1bdb3e20788eb08e25
Tangentially related, NATO SC was scraping nitter.poast.org, but they were only scraping their own account UA belonged to an electronic sign or something, probably they were just trying to get their Twitter posts onto a sign in the lobby without having to go through the Twitter API.
There have been other IP addresses that belong to government buildings sniffing around, a lot of them are just browsing. There are a handful of scrapers that remain mysterious. Probably more are coming, which is retarded because you don't even need to scrape fedi to get all of the posts.