虫草什么时间吃最好| 吃什么肉好| 敌是什么生肖| 为什么会脾虚| 干燥剂是什么成分| 鳞状上皮内低度病变是什么意思| 看日出是什么生肖| 冰片是什么| 菽是什么意思| 腱鞘炎去医院挂什么科| 麝香是什么| 补铁吃什么药| 法国鳄鱼属于什么档次| 背靠背是什么意思| 庶母是什么意思| 茉莉花有什么功效| 58岁属什么生肖| 梦见好多虫子是什么意思| 以什么当什么| 乳酸堆积是什么意思| 元春省亲为什么在晚上| 1985年什么命| 肉蒲团是什么| 爱钻牛角尖是什么意思| 怀孕什么水果不能吃| 霜降吃什么| 7月15号是什么星座| 梁五行属什么| 物以类聚人以群分什么意思| 怀孕了想打掉吃什么药| 原配是什么意思| 财运亨通是什么意思| 颈椎间盘突出有什么症状| 计生用品是什么| 八方来财是什么生肖| 耳朵堵塞感是什么原因| 嘴唇起泡用什么药| 早餐吃什么最有营养| 2月18号是什么星座| 白介素是什么| 白色念珠菌是什么意思| 99新是什么意思| 5月5是什么星座| 吃什么补蛋白质最快| 女性排卵期有什么表现| 属猪适合佩戴什么饰品| 什么菜好吃| 接待是什么意思| 腋毛脱落是什么原因| 618是什么日子| 传染病检查项目有什么| 日月同辉是什么意思| bf是什么意思| 六月份适合种什么蔬菜| 澳门是什么花| 妮子什么意思| 吃什么最养胃| 牙套什么年龄戴合适| sids是什么意思| 总做噩梦是什么原因| cpp是什么| 鼻窦粘膜增厚什么意思| 没心没肺是什么意思| 包皮红肿瘙痒用什么药| 八髎区疼是什么原因| 血脂高胆固醇高吃什么食物最好| 自残是什么心理| a型血的孩子父母是什么血型| 操逼是什么感觉| 甲状腺4级是什么意思| 什么是资本运作| 什么是癫痫| 2.20什么星座| 多喝白开水有什么好处| 前卫是什么意思| 乳核是什么| 吃粥配什么菜| 淋巴细胞计数偏低是什么原因| epd是什么意思| 脑梗有什么后遗症| 舌头发麻是什么原因引起的| 眼睛红血丝用什么眼药水| 胎方位roa是什么意思| 猫字五行属什么| 子宫内膜炎用什么药效果好| 不眠之夜是什么意思| com代表什么意思| 痔疮什么样| 致字五行属什么| 梦见玫瑰花是什么预兆| 有什么好的赚钱方法| 戊是什么意思| 沙土地适合种什么农作物| 什么叫做凤凰男| 什么体质容易怀双胞胎| 头胀是什么原因导致的| 午字五行属什么| 兆后面是什么单位| 女性阴部潮湿是什么原因| 经期吃什么补血| 什么是禽流感| 儿菜是什么菜| 查肾挂什么科| 长得什么| 喜欢出汗是什么原因| 什么叫做原发性高血压| 给你脸了是什么意思| 师长相当于地方什么级别| 右后背疼是什么病| 什么是尿频| 明年属什么生肖| 做梦死人了是什么征兆| 下饭是什么意思| 过期的啤酒能干什么| 吃什么对神经恢复快速| 电脑长期不关机有什么影响| 血小板升高是什么原因| 宫寒是什么原因引起的如何调理| 口若悬河什么意思| 房东是什么意思| 舌头边缘有齿痕是什么原因| 条的偏旁是什么| 文科生选什么专业| 翡翠和和田玉有什么区别| 什么地什么| 腹胀便溏是什么意思| 蛰居是什么意思| 水瓶女和什么座最配| 副教授是什么级别| 不宁腿综合症吃什么药| rainbow什么意思| 石斛什么人不适合吃| 来例假能吃什么水果| 牙齿浮起来是什么原因| 克罗恩病有什么症状| 4.13什么星座| 感冒吃什么好得快| 养肝护肝喝什么茶最好| 石化是什么意思| 考试紧张吃什么药可缓解| 头皮屑多用什么洗发水效果好| 尿频挂什么科| 长粉刺是什么原因| 高净值什么意思| 驴肉不能和什么一起吃| 什么鸡没有毛| 脚上有水泡是什么原因| 弓形虫是什么| 喝什么解酒快| 夏天哈尔滨有什么好玩的地方| 毛囊炎是什么症状| cpk是什么意思啊| 下旬是什么意思| 鸭肚是鸭的什么部位| 脾虚生痰吃什么中成药| 打狂犬疫苗不能吃什么食物| 双肺门不大是什么意思| 什么蔬菜补铁| 大红袍属于什么茶类| 痤疮是什么样子的| 调制乳粉是什么意思| 马步鱼为什么是甜的| 奶奶的妈妈应该叫什么| 2010年属虎的是什么命| 天蝎座和什么星座最不配| 御姐是什么意思| 梦见赢钱了是什么预兆| 女性尿道出血是什么原因引起的| 知了猴有什么营养| e大饼是什么牌子| 拉屎有泡沫是什么原因| 麦冬有什么作用与功效| 孕期不能吃什么| 时刻是什么意思| 阴液是什么| 病毒疣是什么| 发烧吃什么食物| 11.15是什么星座| 什么是幼小衔接| 肾阴阳两虚用什么药| 霍金什么时候去世| 虾仁炒什么好吃又简单| 受凉肚子疼吃什么药| 婴儿眉毛上黄痂是什么| 湿阻病是什么病| 多西环素片主治什么| 是什么药| 53年属什么生肖| 身份证带x是什么意思| 卒中患者什么意思| 心烦意乱吃什么药| bitch是什么意思| 腺样体增生是什么意思| 什么是阿尔兹海默症| 吐痰带血丝是什么原因| 早晚体重一样说明什么| 美容美体是干什么的| 眼角发白是什么原因| 氨甲环酸又叫什么名| 梦见和死去的亲人说话是什么意思| 化痰祛痰吃什么药| 38是什么意思| 老年痴呆症又叫什么名字| ch什么意思| 11月30号什么星座| 查电话号码打什么电话| 不撞南墙不回头是什么意思| 安坦又叫什么药| 小便无力是什么原因| 滑膜增厚是什么意思| 败血症是什么| 井代表什么生肖| 过期的维生素e有什么用途| 酪朊酸钠是什么| 月经期间不能吃什么水果| 什么球不能拍| 内向什么意思| 东方不败练的什么武功| 丝瓜不能和什么一起吃| 广谱是什么意思| 阴虚火旺是什么症状| 血肿不治疗有什么后果| 空泡蝶鞍是什么病| 公元500年是什么朝代| 阴道排气是什么原因| o型血和b型血的孩子是什么血型| 眼角膜脱落有什么症状| 国际章是什么意思| 姓姜的男孩起什么名字好| 保育是什么意思| 海盐是什么盐| 联合创始人是什么意思| 转氨酶高吃什么药最好| 1998年属什么生肖| 肿瘤前期有什么症状| 神是什么意思| 犹怜是什么意思| 博文是什么意思| 舌头上有红点点是什么原因| 游离甲状腺素偏低是什么意思| 吃万艾可有什么副作用| 为什么游戏| 费气肿要吃什么药| 三点水一个前读什么| 梦见和死人一起吃饭是什么意思| 什么食物| 什么是地包天牙齿图片| 什么是三有保护动物| 扫把和什么是一套的| 什么是风湿| 跳梁小丑是什么生肖| 胃胆汁反流是什么原因引起的| 金银花长什么样子图片| 吃什么补肝最好| 肚子胀疼是什么原因| 大口什么字| dhea是什么药| 哺乳期吃辣椒对宝宝有什么影响| 拔牙吃什么消炎药好| 立棍是什么意思| 咳嗽有什么特效药| 肛门口瘙痒涂什么药膏| 肌酐高吃什么药| 彩色的什么| 百度

Entries Tagged "Anonymous"

Page 1 of 1

Leak of Russian Censorship Data

The transparency organization Distributed Denial of Secrets has released 800GB of data from Roskomnadzor, the Russian government censorship organization.

Specifically, Distributed Denial of Secrets says the data comes from the Roskomnadzor of the Republic of Bashkortostan. The Republic of Bashkortostan is in the west of the country.

[…]

The data is split into two main categories: a series of over 360,000 files totalling in at 526.9GB and which date up to as recently as March 5, and then two databases that are 290.6GB in size, according to Distributed Denial of Secrets’ website.

Posted on March 14, 2022 at 6:09 AM ? View Comments

On Anonymous

Gabriella Coleman has published an interesting analysis of the hacker group Anonymous:

Abstract: Since 2010, digital direct action, including leaks, hacking and mass protest, has become a regular feature of political life on the Internet. The source, strengths and weakness of this activity are considered in this paper through an in-depth analysis of Anonymous, the protest ensemble that has been adept at magnifying issues, boosting existing - usually oppositional - movements and converting amorphous discontent into a tangible form. This paper, the third in the Internet Governance Paper Series, examines the intersecting elements that contribute to Anonymous’ contemporary geopolitical power: its ability to land media attention, its bold and recognizable aesthetics, its participatory openness, the misinformation that surrounds it and, in particular, its unpredictability.

Posted on October 3, 2013 at 6:43 AM ? View Comments

DDOS as Civil Disobedience

For a while now, I have been thinking about what civil disobedience looks like in the Internet Age. Certainly DDOS attacks, and politically motivated hacking in general, is a part of that. This is one of the reasons I found Molly Sauter’s recent thesis, “Distributed Denial of Service Actions and the Challenge of Civil Disobedience on the Internet,” so interesting:

Abstract: This thesis examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism. DDOS actions have been used in online political activism since the early 1990s, though the tactic has recently attracted significant public attention with the actions of Anonymous and Operation Payback in December 2010. Guiding this work is the overarching question of how civil disobedience and disruptive activism can be practiced in the current online space. The internet acts as a vital arena of communication, self expression, and interpersonal organizing. When there is a message to convey, words to get out, people to organize, many will turn to the internet as the zone of that activity. Online, people sign petitions, investigate stories and rumors, amplify links and videos, donate money, and show their support for causes in a variety of ways. But as familiar and widely accepted activist tools—petitions, fundraisers, mass letter-writing, call-in campaigns and others—find equivalent practices in the online space, is there also room for the tactics of disruption and civil disobedience that are equally familiar from the realm of street marches, occupations, and sit-ins? This thesis grounds activist DDOS historically, focusing on early deployments of the tactic as well as modern instances to trace its development over time, both in theory and in practice. Through that examination, as well as tool design and development, participant identity, and state and corporate responses, this thesis presents an account of the development and current state of activist DDOS actions. It ends by presenting an analytical framework for the analysis of activist DDOS actions.

One of the problems with the legal system is that it doesn’t make any differentiation between civil disobedience and “normal” criminal activity on the Internet, though it does in the real world.

Posted on May 22, 2013 at 6:24 AM ? View Comments

Random Passwords in the Wild

Interesting analysis:

the hacktivist group Anonymous hacked into several BART servers. They leaked part of a database of users from myBART, a website which provides frequent BART riders with email updates about activities near BART stations. An interesting aspect of the leak is that 1,346 of the 2,002 accounts seem to have randomly-generated passwords-a rare opportunity to study this approach to password security.

Posted on October 20, 2011 at 6:25 AM ? View Comments

Is There a Hacking Epidemic?

Freakonomics asks: “Why has there been such a spike in hacking recently? Or is it merely a function of us paying closer attention and of institutions being more open about reporting security breaches?”

They posted five answers, including mine:

The apparent recent hacking epidemic is more a function of news reporting than an actual epidemic. Like shark attacks or school violence, natural fluctuations in data become press epidemics, as more reporters write about more events, and more people read about them. Just because the average person reads more articles about more events doesn’t mean that there are more events—just more articles.

Hacking for fun—like LulzSec—has been around for decades. It’s where hacking started, before criminals discovered the Internet in the 1990s. Criminal hacking for profit—like the Citibank hack—has been around for over a decade. International espionage existed for millennia before the Internet, and has never taken a holiday.

The past several months have brought us a string of newsworthy hacking incidents. First there was the hacking group Anonymous, and its hacktivism attacks as a response to the pressure to interdict contributions to Julian Assange‘s legal defense fund and the torture of Bradley Manning. Then there was the probably espionage-related attack against RSA, Inc. and its authentication token—made more newsworthy because of the bungling of the disclosure by the company—and the subsequent attack against Lockheed Martin. And finally, there were the very public attacks against Sony, which became the company to attack simply because everyone else was attacking it, and the public hacktivism by LulzSec.

None of this is new. None of this is unprecedented. To a security professional, most of it isn’t even interesting. And while national intelligence organizations and some criminal groups are organized, hacker groups like Anonymous and LulzSec are much more informal. Despite the impression we get from movies, there is no organization. There’s no membership, there are no dues, there is no initiation. It’s just a bunch of guys. You too can join Anonymous—just hack something, and claim you’re a member. That’s probably what the members of Anonymous arrested in Turkey were: 32 people who just decided to use that name.

It’s not that things are getting worse; it’s that things were always this bad. To a lot of security professionals, the value of some of these groups is to graphically illustrate what we’ve been saying for years: organizations need to beef up their security against a wide variety of threats. But the recent news epidemic also illustrates how safe the Internet is. Because news articles are the only contact most of us have had with any of these attacks.

Posted on July 21, 2011 at 6:07 AM ? View Comments

Members of "Anonymous" Hacker Group Arrested

The police arrested sixteen suspected members of the Anonymous hacker group.

Whatever you may think of their politics, the group committed crimes and their members should be arrested and prosecuted. I just hope we don’t get a media flurry about how they were some sort of cyber super criminals. Near as I can tell, they were just garden variety hackers who were lucky and caught a media wave.

EDITED TO ADD (7/19): I understand that the particular people arrested are innocent until proven guilty—hence my use of the word “suspected” in the first sentence—but there doesn’t seem any question that members of the group claimed credit for criminal cyber attacks. I suppose I could have said “the group allegedly committed crimes,” but that seemed overly cautious.

And yes, I agree that calling them a “group” is probably giving them more organizational credit than they have.

EDITED TO ADD (7/19): More news articles.

EDITED TO ADD (7/25): Last December, Richard Stallman wrote about the Anonymous group and their actions as a form of protest.

EDITED TO ADD (8/12): Department of Justice press release on the arrests.

Posted on July 19, 2011 at 2:50 PM ? View Comments

Anonymous vs HBGary

One of the effects of writing a book is that I don’t have the time to devote to other writing. So while I’ve been wanting to write about Anonymous vs HBGary, I don’t think I will have time. Here’s an excellent series of posts on the topic from ArsTechnica.

In cyberspace, the balance of power is on the side of the attacker. Attacking a network is much easier than defending a network. That may change eventually—there might someday be the cyberspace equivalent of trench warfare, where the defender has the natural advantage—but not anytime soon.

EDITED TO ADD (3/14): Stephen Colbert on HGary. Another article.

Posted on February 28, 2011 at 5:58 AM ? View Comments

HBGary and the Future of the IT Security Industry

This is a really good piece by Paul Roberts on Anonymous vs. HBGary: not the tactics or the politics, but what HBGary demonstrates about the IT security industry.

But I think the real lesson of the hack – and of the revelations that followed it – is that the IT security industry, having finally gotten the attention of law makers, Pentagon generals and public policy establishment wonks in the Beltway, is now in mortal danger of losing its soul. We’ve convinced the world that the threat is real – omnipresent and omnipotent. But in our desire to combat it, we are becoming indistinguishable from the folks with the black hats.

[…]

…While “scare ’em and snare ’em” may be business as usual in the IT security industry, other HBGary Federal skunk works projects clearly crossed a line: a proposal for a major U.S. bank, allegedly Bank of America, to launch offensive cyber attacks on the servers that host the whistle blower site Wikileaks. HBGary was part of a triumvirate of firms that also included Palantir Inc and Berico Technologies, that was working with the law firm of the U.S. Chamber of Commerce to develop plans to target progressive groups, labor unions and other left-leaning non profits who the Chamber opposed with a campaign of false information and entrapment. Other leaked e-mail messages reveal work with General Dynamics and a host of other firms to develop custom, stealth malware and collaborations with other firms selling offensive cyber capabilities including knowledge of previously undiscovered (“zero day”) vulnerabilities.

[…]

What’s more disturbing is the way that the folks at HBGary – mostly Aaron Barr, but others as well – came to view the infowar tactics they were pitching to the military and its contractors as applicable in the civilian context, as well. How effortlessly and seamlessly the focus on “advanced persistent threats” shifted from government backed hackers in China and Russia to encompass political foes like ThinkProgress or the columnist Glenn Greenwald. Anonymous may have committed crimes that demand punishment – but its up to the FBI to handle that, not “a large U.S. bank” or its attorneys.

Read the whole thing.

Posted on February 25, 2011 at 6:14 AM ? View Comments

Sidebar photo of Bruce Schneier by Joe MacInnis.

脚背浮肿是什么原因引起的 史诗级什么意思 起伏不定是什么意思 傻子是什么意思 检查头部应该挂什么科
什么是尿潴留 有什么好看的三级片 腿上无缘无故出现淤青是什么原因 打2个喷嚏代表什么 三情六欲是什么意思
十八罗汉分别叫什么 北京古代叫什么 痛风什么水果不能吃 九出十三归是什么意思 c反应蛋白低说明什么
品牌主理人是什么意思 985学校是什么意思 mp5是什么 11.10是什么星座 绍兴本地人喝什么黄酒
梦见买手表是什么预兆hcv7jop6ns3r.cn 过敏性鼻炎用什么药最好hcv9jop5ns8r.cn 脓是什么hcv8jop7ns9r.cn 小孩咳嗽是什么原因引起的hcv9jop1ns1r.cn 什么食物可以化解结石hcv9jop1ns9r.cn
丁亥日五行属什么hcv7jop6ns2r.cn 健脾益气是什么意思gysmod.com 胃暖气是什么症状hcv9jop1ns0r.cn 什么是面瘫hcv7jop4ns7r.cn 痛风什么感觉zsyouku.com
开化龙顶属于什么茶0297y7.com 手麻吃什么药最好hcv9jop0ns9r.cn 肺囊肿是什么病严重吗hcv8jop2ns9r.cn 冬虫夏草有什么功效与作用hcv8jop6ns7r.cn 凯旋归来是什么意思hcv9jop5ns2r.cn
血糖高的人早餐吃什么最好hcv9jop5ns1r.cn 2楼五行属什么yanzhenzixun.com 酒后头疼吃什么药hcv8jop0ns3r.cn 黑眼圈严重是什么原因hcv8jop0ns4r.cn 梦到头上长虱子什么意思hcv9jop6ns2r.cn
百度