• Wilco@lemmy.zip
    link
    fedilink
    arrow-up
    1
    ·
    17 minutes ago

    The hacker should send Trump an Epstein Island invite … the old pedo pervert may have a stroke from it.

  • justastranger@sh.itjust.works
    link
    fedilink
    arrow-up
    10
    arrow-down
    5
    ·
    3 hours ago

    Are you stupid? Do you believe that anyone should be allowed to post anything anywhere? Just because the post is about Epstein doesn’t make it appropriate to post in that subreddit. And just because it was removed doesn’t mean the mods removed it, let alone that they might have an Epstein-related agenda in removing it. Just look at the automod response in that deleted thread. You should be ashamed of yourself.

    • PhoenixDog@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      2 hours ago

      Former Reddit mod of an NHL hockey team and a Canadian province before Reddit purged me from their site. I can say with confidence that the sub mods including myself removed a lot of important content that didn’t fit the sub. There were other subs like /r/hockey or city subreddits that would have been better venues for what they were posting and still got backlash in the modmail.

      We’re trying to help run a community and keep it central to the subject matter at hand. We understand this is important but if it doesn’t fit in the framework of the sub, it isn’t allowed.

      You probably can’t post a funny comic strip in /r/politics.

  • Phoenixz@lemmy.ca
    link
    fedilink
    arrow-up
    91
    arrow-down
    11
    ·
    24 hours ago

    Nobody hacked anything

    People found account credentials and tried using them. Nothing nhogh tech here

      • tuhriel@discuss.tchncs.de
        link
        fedilink
        arrow-up
        5
        arrow-down
        6
        ·
        4 hours ago

        No hacking is circumventing the security…if you send out the password it is really bad secops. Stop selling negligence of a party as hacking.

          • raspberriesareyummy@lemmy.world
            link
            fedilink
            arrow-up
            3
            arrow-down
            8
            ·
            3 hours ago

            No, that’s just the definition that dumb fucks use to justify punishing people for their own stupidity. Unauthorized access and whatever you do with it is completely independent from HOW you gain access. And using legitimate credentials is not hacking. Obtaining the credentials may be done by hacking, but if they are just negligently tossed into the world, it’s not.

            Same as losing your house keys and having someone use them to enter your house is unauthorized entry and violation of a set of laws, but it is NOT breaking into a house.

            • Saryn@lemmy.world
              link
              fedilink
              arrow-up
              7
              ·
              3 hours ago

              Nope, that’s the literal definition.

              Not to worry though - I see lot more dumb fuckery in your future.

              Now dance!

    • Donkter@lemmy.world
      link
      fedilink
      arrow-up
      35
      ·
      9 hours ago

      Many hackers agree that the best way to hack someone is through social engineering to just have them tell you your password.

      • VitoRobles@lemmy.today
        link
        fedilink
        English
        arrow-up
        15
        ·
        8 hours ago

        My favorite is when this security researcher showed on camera how she did it. She took out her laptop and pulled up a soundboard. She pretended to be mom with a crying baby, and begged the customer support to change her account email and reset her password. When they did try to ask for some verification, she played the baby crying sound effects louder. Feeling bad for her, they did what she asked and she “hacked” into the account.

    • boogiebored@lemmy.world
      link
      fedilink
      arrow-up
      20
      arrow-down
      2
      ·
      edit-2
      10 hours ago

      Hacking is very wide and can include things like this. It does not have to be as technical, hard or clever as most gatekeep it to be.

      Source: 20 years of experience in the space

      ex. password stuffing brute force is hacking

      • CeeBee_Eh@lemmy.world
        link
        fedilink
        arrow-up
        9
        arrow-down
        23
        ·
        edit-2
        12 hours ago

        That’s still not hacking. It’s “unauthorized access” like you said, or “gaining access”. Hacking requires bypassing some security measure or obtaining access through some technological or social engineering means.

        • thermal_shock@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 hours ago

          Or having the FBI leak your password and you using it without authorization. Legally it 100% falls under hacking in the USA.

          https://www.law.cornell.edu/wex/hacking

          First sentence. You don’t have to have stolen the password, if you login to another account, and someone proves you did, you can be charged if they want to pursue it.

          • CeeBee_Eh@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            2 hours ago

            In a legal context, hacking is a term for utilizing an unconventional or illicit means to gain unauthorized access to a digital device, computer system, or network.

            We can rule out “illicit” because the FBI published the data publicly. Now the heavy lifting has to be done by “unconventional”, which I don’t think qualifies here. A government agency published the credentials, which means no one had to do social engineering, sneak into an office, reverse engineer anything, or even guess a person’s birthday.

            Now if this somehow went to court, a judge might rule that this qualifies as hacking, but my opinion is that it doesn’t.

        • The Quuuuuill@slrpnk.net
          link
          fedilink
          English
          arrow-up
          9
          arrow-down
          1
          ·
          10 hours ago

          that’s still hacking. hacking is gaining unauthorized access to a system through:

          • social engineering
          • cypher breaking
          • brute force

          of the three the first is BY FAR the most common and efficient. it’s also the least sexy so they don’t make movies about it and the public perception is that it’s something else

          • CeeBee_Eh@lemmy.world
            link
            fedilink
            arrow-up
            2
            arrow-down
            6
            ·
            9 hours ago

            I agree with what you said. This also wasn’t social engineering. The password was just there and available.

            Also, the excellent and amazing movie Hackers features plenty of social engineering.

            Also, I didn’t say “excellent” and “amazing” sarcastically. It really is an under rated movie.

            • thermal_shock@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              arrow-down
              1
              ·
              4 hours ago

              It was there, doesn’t mean it was for you. If you found a car with the keys in it, would you steal it or realize you shouldn’t do that?

              • CeeBee_Eh@lemmy.world
                link
                fedilink
                arrow-up
                1
                ·
                2 hours ago

                It was there, doesn’t mean it was for you.

                Look, I’m not arguing about whether this is illegal or not. I’m arguing about the literal definition of the term “hacking”.

                It’s just like walking into a strangers house without permission where the door is wide open is technically illegal, but it can’t qualify as “breaking and entering”.

          • thermal_shock@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 hours ago

            Richard chase vibes

            Richard Trenton Chase was an American serial killer, cannibal and necrophile known as the Vampire of Sacramento, the Dracula Killer and the Vampire Killer, who killed six people between December 1977 and January 1978 in Sacramento, California. All of Chase’s victims were chosen at random. Wikipedia

          • CeeBee_Eh@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            4 hours ago

            Well yes. It would be “unlawful entry” (or whatever it’s called) versus “breaking and entering”.

        • Smoogs@lemmy.world
          link
          fedilink
          English
          arrow-up
          12
          arrow-down
          6
          ·
          edit-2
          12 hours ago

          you’re taking this splitting hairs to the moon today aren’t you, little troll.

          Talk about a hard derail to burry the lead.

          The thing everyone wants to see to dethrone this racist pile of shite and you’re over here like “it’s pronounced potato, not potato.”

          • CeeBee_Eh@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            3 hours ago

            you’re taking this splitting hairs to the moon today aren’t you, little troll

            Troll? Where the hell are you coming from?

            The thing everyone wants to see to dethrone this racist pile of shite and you’re over here like “it’s pronounced potato, not potato.”

            So you have an issue with me arguing that people gaining access to this information are not breaking the law?

        • fallaciousBasis@lemmy.world
          link
          fedilink
          arrow-up
          8
          arrow-down
          3
          ·
          11 hours ago

          Unauthorized access is hacking.

          Doesn’t matter if a person has a computer with no password at all. If you are on their computer and you are not authorized to use their computer that is a crime.

          • CeeBee_Eh@lemmy.world
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            3 hours ago

            So your claim is that if I sit down at a computer that isn’t mine and has no security measures in place, and then open a file, that I have legally “hacked” the computer?

            The minimal definition you can fall back to is “unauthorized access”. But now you have to establish and argue that an unsecured computer/system is off limits to everyone except the owner. Which then opens up a big can of worms with network connected devices, and demonstrates that such basic and literal verbatim interpretation doesn’t work in reality.

            • fallaciousBasis@lemmy.world
              link
              fedilink
              arrow-up
              1
              arrow-down
              1
              ·
              3 hours ago

              That’s not ‘my claim.’ That’s the law.

              You can call it hacking or whatever. The legal term is: unauthorized access to a computer system.

              Think about it in any other way? So I’m just walking down the street… I see a house… I go open a door… I open the fridge. Make myself a sandwich. Then go to a bedroom that’s not mine. Put on some underwear that isn’t mine and leave some stains on the sheets…

              Why don’t you just go rape somebody? And clearly you have authorization to access that vagina or that butthole or mouth or however your fetish desires???

              Just tell me you’ve been on Epstein’s Island… Jfc? Wtf is wrong with you, CeeBee_Eh?

              • CeeBee_Eh@lemmy.world
                link
                fedilink
                arrow-up
                1
                ·
                1 hour ago

                The legal term is: unauthorized access to a computer system.

                No, the legal definition is this:

                In a legal context, hacking is a term for utilizing an unconventional or illicit means to gain unauthorized access to a digital device, computer system, or network.

                Source: https://www.law.cornell.edu/wex/hacking

                So this wasn’t illicit, because the FBI publicly published the data. So the argument has to be made with “unconventional”. This is what I disagree on.

                Think about it in any other way? So I’m just walking down the street… I see a house… I go open a door… I open the fridge. Make myself a sandwich. Then go to a bedroom that’s not mine. Put on some underwear that isn’t mine and leave some stains on the sheets…

                That’s illegal. There’s a law for that. There are also laws that protect digital assets in a similar way, and they fall under Cybercrime.

                Why don’t you just go rape somebody? And clearly you have authorization to access that vagina or that butthole or mouth or however your fetish desires???

                Calm down there, Epstein.

                Just tell me you’ve been on Epstein’s Island… Jfc? Wtf is wrong with you, CeeBee_Eh?

                You suck at rage baiting. I’m advocating for exposing more of the emails and not letting people refer to it as “hacking”, and you’re so enraged by someone disagreeing with you that you literally call that person “Epstein”. I know mental health care isn’t much of a thing in the US, but please find some help. For all our sakes.

            • badgermurphy@lemmy.world
              link
              fedilink
              arrow-up
              1
              arrow-down
              2
              ·
              6 hours ago

              You can. You violated the TOS by sharing the details, making it exceptionally easy for them to hack you, then they did.

              • CeeBee_Eh@lemmy.world
                link
                fedilink
                arrow-up
                2
                ·
                3 hours ago

                You violated the TOS by sharing the details

                A TOS violation is not the same as breaking the law. If that were the case then every single person on the face on the planet would be a criminal.

                • badgermurphy@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  2 hours ago

                  You didn’t break the law, just violated a contract. The user you gave your credentials to violated the law, because the contract you signed stipulated that permission for them to access your account was not yours to give. That means they accessed your account in an unauthorized manner, which meets the definition of hacking.

                  I am not trying to argue the merits of what does and doesn’t constitute hacking, but these terms have objective, legal definitions in the jurisdictions they’re taking place. We don’t have to like or agree with those things, but it doesn’t change the current situation that has them set up this way.

          • CeeBee_Eh@lemmy.world
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            3 hours ago

            The base legal definition of “hacking” is “unauthorized access”. Then the trick becomes establishing “unauthorized”. The reason this matters is if a website is publicly accessible, then it’s assumed to be authorized even though it’s not explicitly stated by anyone. However, you are accessing information on a computer system you do not own and were not given explicit permission to access.

            Now let’s say in the HTML or JS there’s an endpoint to a backend server that’s not directly exposed via online searches or page links. And through that link you are able to expose sensitive data that’s not shown on the webpage.

            Now, how is the definition of “unauthorized access” or “hacking” applied here?

            Edit: yes this is splitting atoms, but that’s the world of legal definitions

  • fizzle@quokk.au
    link
    fedilink
    English
    arrow-up
    113
    arrow-down
    1
    ·
    1 day ago

    Maybe I’m misunderstanding something because no one here has mentioned the obvious:

    Did we acquire the full unredacted set of his emails ?

    • REDACTED@infosec.pub
      link
      fedilink
      English
      arrow-up
      16
      ·
      11 hours ago

      From what I remember, the guy said that not much was left and most of the emails were deleted

    • ubersolver@lemmy.world
      link
      fedilink
      arrow-up
      80
      ·
      1 day ago

      Seriously, wouldn’t this be kind of huge news if we suddenly had access to the evidence they tried to hide? Too bad this is a news article and someone probably changed the password by now.

    • tetrachromacy@lemmy.world
      link
      fedilink
      arrow-up
      47
      arrow-down
      2
      ·
      1 day ago

      There’s no news on it and I have to assume it’s because if that is the full unredacted email there’s probably a ton of CSAM. If so it’s technically illegal to own and anyone who is downloading it might be opening themselves up to arrest or legal challenges, even if they’re a journalist.

      I would presume IF this is a full release of the Epstein GMail account, and IF it’s not a honeypot op of some kind from CIA/IDF/SVR/whoever, and IF it’s legit… then this is big. Nearly all American news orgs have been gutted though, and I doubt any billionaire that owns the news orgs would be ok with having their wealthy cohort exposed.

      Whoever might be investigating this would almost certainly keep quiet until all of their ducks are in a row because the second they publish, they’re going to be arrested for CSAM. Unless they’re in a country with no extradition treaty with the US. And even then they’ll be subject to extraordinary rendition cause Trump don’t care about US law, why would the lack of an extradition treaty stop him?

      • ubersolver@lemmy.world
        link
        fedilink
        arrow-up
        31
        ·
        edit-2
        1 day ago

        It’s ridiculous that evidence of the crimes they committed is going to be used to arrest anyone who tries to uncover evidence of who committed those crimes. By ridiculous I don’t mean I don’t think it will happen. I think you are right about that.

        I mean, I know there are some people who would definitely do the wrong thing and that’s why it needed to be released carefully to avoid this kind of mess and why normally this kind of digging would be done by the government or trusted investigators, but it’s troublesome because the established power structure (regardless of party) are some of the same people who committed these crimes and we clearly can’t trust them to do the right thing.

  • Schwim Dandy@piefed.zip
    link
    fedilink
    English
    arrow-up
    185
    arrow-down
    7
    ·
    1 day ago

    Soooooo, reading someone’s password then using it is “hacking” now?

    Yours,
    Schwim, Master Hacker

    • criss_cross@lemmy.world
      link
      fedilink
      arrow-up
      18
      ·
      21 hours ago

      Apparently the word “don’t” can also be found redacted.

      Because they did a regex for Don(.)T and didn’t bother to check

      • Coelacanth@feddit.nu
        link
        fedilink
        arrow-up
        9
        ·
        12 hours ago

        They did bother to check, they are just sloppy. It seems like it’s more that one slipped through the cracks. There are plenty of unredacted “don t” in the files. Looks like they did blanket redactions of “Don T” (and other Trump related names) and then went through manually and unredacted false positives to cover their tracks. But they missed one. It’s still a smoking gun, though, as there’s literally no reason to redact “don t”.

    • P1k1e@lemmy.world
      link
      fedilink
      arrow-up
      42
      ·
      1 day ago

      They were so busy hunting for the rapists they completely forgot about passwords…or we’ve got some decent folks weaponizing “incompetence”

      • CainTheLongshot@lemmy.world
        link
        fedilink
        arrow-up
        24
        ·
        edit-2
        1 day ago

        I’m convinced they used AI to redact everything, and didn’t double back and check them until after a particular page made headlines.

        I’ve seen numerous videos where they program a script to remove the 5-6 different ways “redactions” were added and they make no sense from a technical stand point, leaving me to believe that someone non-technical told AI exactly how they wanted to redact, and then put those files in their outbox.

        • NotSteve_@piefed.ca
          link
          fedilink
          English
          arrow-up
          13
          ·
          22 hours ago

          They uploaded the Bash 3.3 reference manual and even that had some redactions so your theory is almost definitely correct

        • P1k1e@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          1 day ago

          Yea this is highly likely… I can’t imagine how they made it this far being so… Fukkin dum

    • justastranger@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      3 hours ago

      It’s insane that you’re one of the only comments actually responding to the post itself. I’m starting to think Lemmy is being taken over by bots even worse than Reddit.

      • FaceDeer@fedia.io
        link
        fedilink
        arrow-up
        1
        ·
        3 hours ago

        Smaller populations make it easier to form social bubbles, I suppose. And this community in particular is focused on not liking something, so it’s easy to throw out a quick “ooh, I hate thing!” To get some positive engagement.