[ / / / / / / / / / / / / / ] [ dir / random / degen / fit / fringe / htg / k / loomis / pone / sl ]

/qpatriotresearch/ - Patriot Research

Keep Research Great
Name
Email
Subject
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Voice recorder Show voice recorder

(the Stop button will be clickable 5 seconds after you press Record)
Options

Allowed file types:jpg, jpeg, gif, png, webm, mp4, swf, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


File: 9b08cf520f00cb7⋯.jpeg (10.6 KB, 300x204, 25:17, aadfgxfgdxfgdfx.jpeg)

2d955a  No.10747

The Tritter Scam Tool - The real HACK

There is more to this tritter "hack" that's being portrayed in the media..It is rumored that Tritter has a top secret "Scam Tool" (more secret than the Account Tool)..This "Scam Tool" has been selectively and sometimes covertly spamming tritter threads for years now..

It's more likely that it was this secretly integrated Scam Tool that was compromised, not the Account Tool (although the Account Tool is real)..The accounts were not hacked, the Scam Tool was hacked..The Scam Tool does more than scam, it impersonates and sends on behalf (without needing the account password)..

Only trusted staffers would have access to this restricted tool..This would mean a highly sophisticated "hack" would be required to compromise it..Whoever compromised this Scam Tool intentionally exposed it by running it against key high-level accounts..Uncloaked and visible to all..

The service interruptions were due to mitigating the hack, not the hack itself..This hack is bigger than people can imagine..This hack most likely exposed Tritter in being complicit (or even an accomplice) in very serious crimes..It exposes a secret integrated in-place tool that's able to impersonate (or send on behalf of) every single tritter account that exists..

This is not just account access manipulation..It's full account impersonation and control by an unauthorised third party (permitted or perpetrated by the platform owner)..Not only does it expose a backdoor, it means there is a tool in place to send messages as-if from any private account (or internal company owned or bot account)..It also opens the door to a potential platform-wide criminal enterprise...

Repost from another Anon

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

14569a  No.10751

one or more twitter employees computers were hacked with a targeted phishing attempt. sadly it was lowfi attack which gave up key employee credentials. hackers gained access to the their computers and did the needful.

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
[]
[ / / / / / / / / / / / / / ] [ dir / random / degen / fit / fringe / htg / k / loomis / pone / sl ]