206500+ entries in 0.072s

mircea_popescu: there is no such thing as "owned". they don't havew the grip to own with, which is what the haks prove, and they know they do not have the resources or werewithal to get it, which is what this deranged prosecutorial overactivity proves.
mircea_popescu: this is why i say " within a decade we will see full area denial in the sense that no govt anything will still run online.". they're simply too weak and ineffectual to do anything that matters, and even they know it. by 2025 internet will be exactly like iraq for the usg.
mircea_popescu: "i mean i get it, frantic activity as a cover for YOUR FUCKING IMPOTENCE, but really... get to terms with it already".
mircea_popescu: "he drove it in, i lubed it. it's what i do. what the fuck do you schmucks want ?"
mircea_popescu: they failed to indict the cop and are prosecuiting the mechanic.
mircea_popescu: it's sorta like the guy who does a lube job for the unmarked police car which the cop driving was using to steal coke from the evidence room.
mircea_popescu: and most importantly, where is the fraud, racketeering and criminal organisation/conspiuracy indictment for the us marshall in question ?
☟︎ mircea_popescu: 2. us marshall stole money from the office budget, to buy bitcoin with
mircea_popescu: here is the case : 1. us marshall got a friend of his to intall a cryptolocker on the office computer.
mircea_popescu: ie, defrauding the taxpayer to pay his cybercriminal buttbudies.
mircea_popescu: in any case : the front against the usg in the cyber world is only going to strengthen the way it's going. within a decade we will see full area denial in the sense that no govt anything will still run online.
☟︎ mircea_popescu: half a day of this shit, you're willing to pay money to anyone shooting that way.
mircea_popescu: this is how people end up funding "terrorism", for the record, if anyone wondered.
mircea_popescu: no, no, it's the bitcoin salesman that's to blame. he did it all!
mircea_popescu: and it's also not the fucking marshall's office that ENABLED the criminals by paying them bitcoin
mircea_popescu: so it's not the fucking marshall's office that ENABLED the criminals by paying tax dollars for windows shit
mircea_popescu: "the victims" aka government agents, who both provide the holes and the payments, are a-ok.
mircea_popescu: "By selling bitcoins to the victims, the FBI, notably, holds Murgio responsible for enabling the criminals responsible for the attacks to receive the proceeds of their crimes."
mircea_popescu: but they propose the gun shop owner did somethingwrong.
mircea_popescu: is excused from murder, and from illegal use of his budget
mircea_popescu: basically, the situation here is, us marshall goes into gun shop, buys ammo, shotos his wife.
mircea_popescu: the sold bitcoin to some derps who needed it to pay cryptolocker.
mircea_popescu: them having thew windows hole in the first time, for which they paid with more public funds, also fine.
mircea_popescu: "Additionally, the FBI said that the Murgio sold bitcoins to victims of ransomware attacks such as Cryptowall. " << yeah, like various USG offices, including if memory serves a sherrif. i suppose this is now a crime, right ? selling bitcoin to the derps. them using public funds to pay the ransom IS FINE!
mircea_popescu: ;;later tell bingoboingo "Yet, in the situation where the very fabric and reliability of the Internet at large is threatened it is no one prerogative care that they are offering on open Denial of Service attack amplifier on their connection." i think you accidentally a verb.
mircea_popescu: they'd have seen it as whatever its ip actually were, if actually seeding.
mircea_popescu: of course, this looks a lot more like someone not knowing their way around a netstat dump than a legitimate thing. because i don't imagine torrents work so that a computer ever advertises itself as localhost.
mircea_popescu: ly doing so from the same machine used detect and prepare a report on infringement for Universal."
mircea_popescu: "On the 15th of this month Universal Pictures France filed a takedown request with Google (archived) demanding they remove from results sites hosting or linking pirated copies of Jurassic World. Among the addresses Universal demanded Google sanction was 127.0.0.1 which is the IP address a computer reserves for communicating with itself. This means that not only was Universal seeding its own film to pirates, it was like
mircea_popescu: " In June, JPMorgan reassigned Chief Information Security Officer Greg Rattray amid staff discord over his handling of the breach. Rattray and his boss, Jim Cummings, a former head of the U.S. Air Forces cyber-combat unit, were the chief advocates of the theory that the Russian government was involved in the breach"
mircea_popescu: herp. fancy this : governments currently confuse individuals for governments now.
mircea_popescu: The two are also identified in a previously unreported FBI memo that connects them to the investigation of the hack of JPMorgan as well as to incidents at Fidelity Investments Ltd. and E*Trade Financial Corp. JPMorgan officials argued initially that one of the largest U.S. bank hacks in history was the work of the Russian government."
mircea_popescu: "Though these are separate cases, some of the individuals are linked. A principal in the alleged securities-fraud scheme is a business associate of one of those charged in the Florida bitcoin operation, a friendship dating back more than a decade to their days at Florida State University.
mircea_popescu: omfg who the fuck got bloomberg to put that stupid lined paper background. what, they think ima think they're moar professional like this ?
mircea_popescu: i guess it's the fate of the aspiring 14% to never know what actually sunk their decade of effort.
mircea_popescu: too bad for him, he put all this effort into writing a neat article in the hopes of maybe impressing people, he's almost there and then he shoots his sale in the head with stupid associations like that.
mircea_popescu: and guess what... "Vlad likes long romantic walks on the beach, e-mail him sweet nothings to vlad@tsyrklevich.net using his gpg key." links to keybase.
mircea_popescu: they had to pick between opening webcam studio, call center or "security firm" and not able to find the female lips of either kind for either of the first two settled on what sweaty balls could do.
mircea_popescu: i would say Vlad Tsyrklevich thoroughly vindicates my side in the original discussio re these schmucks.
mircea_popescu: was unable to turn this into a working exploit. It was discovered in October of 2013 and VUPEN used the same bug to win Pwn2Own in May of 2014."
mircea_popescu: "Fuzzer results: Though Rosario's fuzzers found numerous crashing test cases, like most fuzzer outputs few of them appeared exploitable. One of the first crashes that looked exploitable was an IE10 memory corruption that was patched within a week of its discovery. Soon after, Rosario found a Firefox crash that looked exploitable but only appeared to occur under memory pressure. Despite months of analysis, Hacking Team
mircea_popescu: "Rosario is an Italian security researcher with specializations in browser security and fuzzing. [...] During this time he primarily focused on fuzzing SVG, XSLT, and XPath. He was paid $3.5k EUR per month" << alright ? guy made 50k a year. thinkaboutit.
☟︎ mircea_popescu: buncha fucking amateurs this world is made out of i swear.
mircea_popescu: "Several of these forwards included a PDF with VBI's entire exploit portfoli"
mircea_popescu: "Exploit portfolios: VBI regularly sent portfolio updates to its customers. Though they were encrypted, Hacking Team's habit of forwarding encrypted messages unencrypted means that many of them are accessible. "
mircea_popescu: "Hacking Team's CTO claimed that VUPEN burned their (presumably unsold) vulnerabilities after a set period of time to move the exploit market; putting their deployments in jeopardy." doh.
mircea_popescu: s, like Gamma International and NSO Group, prominently advertised their 0day capabilities, forcing Hacking Team to be defensive with prospective customers."
mircea_popescu: "As a result, their 0day providers tended to be small and unestablished. Some established exploit vendors, like VUPEN and COSEINC, did offer to sell Hacking Team exploits, but they were predominantly overpriced, second-rate, and not even 0day. As a result, Hacking Team was seriously exploit supply constrained because they had difficulty finding suppliers that they deemed reliable and reasonably priced. Their competitor
mircea_popescu: ;;later tell gabriel_laddel so talk to her, odds are she'll do it.
mircea_popescu: and obviously, zdrav-an, ie, zdrav-like = strong, hearthy.
mircea_popescu: (jack of cards is fante in romanian; young man about town idem).
mircea_popescu: ;;later tell funkenstein_ hey weren't you pretending to be a dwarf ?