Side note:
Some people might be upset about the threats - IDC but lol
I'm not going to confirm nor deny that the picture is related or that they're actually bad with psychology

Side note:
Some people might be upset about the threats - IDC but lol
I'm not going to confirm nor deny that the picture is related or that they're actually bad with psychology

^^>> also since Elon bought Twitter he was supposed to stop such things - instead he promoted grifters and liars and the crypto scams were legitimized in some people's minds when their main account was suspended and then reinstated on Twitter - more victims were fucked over
It's all kind of sad
And it was part of a side plan to knock Twitter down a peg because apparently anonymous thinks Jack good Elon bad
- over run it with qults Pepe scams and bots (moreso than before)
&&
Hackers had Twitter pwnd - information was slowly being sold on teh dark web - before Elon bought it
"Anonymous and frens" banded together to make it appear as if Elon was so massively incompetent
(Nvm all the jokes being made prior and the data that proves otherwise - and the fact that all the blame is always on the CEO - so technically that issue == Jack's fault )
All part of the strategy which was partially to get big accounts suspended and using hate speech so there could be more articles produced regarding Elon and his quest for free speech putting people in danger
It's all pretty messed up
Personally I thought people could do better - then I remembered what kind of people they are
But this is why all of my Twitter accounts had conflicting information
The phone number would belong to one person, the location might be close by, the name on the email account was another other person so on and so fourth. Just to add a little confusion and even if people narrowed it down, they can't really prove who said or did what with the account and if they wanted more information, they'd have to put in a little effort. Actually, really low level effort on my part.
Anyway, certain verification methods usually serve as a way for good attackers to get more information. I think it's all a catch 22 really.
Promise he's an idiot
🙄🙄🙄🙄
😒😒😒
😮💨🤔
JFC
Elon is clearly a danger

I actually forgot.... But lol!
(I'm going through old stuff in a fantastic nostalgic fashion)

https://www.spiceworks.com/it-security/data-security/news/twitter-api-vulnerability-data-breach/amp/
"Chad Loder, the founder of Habitu8, disclosed an even bigger, or in his words, “massive” data dump consisting of millions of data records of users from the U.S. and the EU. Loder, whose Twitter account was suspended shortly after breaking the news on the microblogging platform, said, “I have contacted a sample of the affected accounts and they confirmed that the breached data is accurate. This breach occurred no earlier than 2021.”
The breached data includes public and private information such as names, Twitter handles, locations, account creation dates, follower and favorites count, email addresses and phone numbers.
The data was scraped through the exploitation of the same vulnerability that was exploited in 2021. While the theft of
5.4 million user data records
was carried out by a threat actor going by the name Devil, the theft of another 1.4 million data records was the work of Pompompurin, the owner of the Breached hacking forum who got the vulnerability tip from Devil."
But ..... Worms.
Blue bird always means Twitter. Spades mean infiltration (but not always) and footprints should be obvious - usually online ones
Even after all this time, people still struggle with things.... Whatever. Shit happens.
Desert scorpion (primarily used on Palestinians)
Surveillanceware is a type of malware that allows bad actors to capture a victim's normally private online activity. This can include texts, messaging apps, geolocation data, photos, documents, voicemails, and even phone conversations.
SpiderFoot is a reconnaissance tool that automatically queries over 100 public data sources to gather intelligence on IP addresses, domain names, e-mail addresses, names and more.
Web scraping is about extracting data from one or more websites. While crawling is about finding or discovering URLs or links on the web. Usually, in web data extraction projects, you need to combine crawling and scraping.
Worms are self replicating viruses that don't just spread through email and can cause slow computer performance. Freezing/crashing. Programs opening and running automatically. Irregular web browser performance.
A network is a web.
Malicious code can also be embedded on legitimate websites as an advertisement.
++ Bee hives and swarms && some other stuff
Clearly.
* it literally spells ID aha (numbers)
Which is funny and also Adaptive Hypermedia Architecture
(So there's that too)
This is probably the worst filing system and the most inefficient way to half ass explain something


Side note:
This is why I didn't care about Ukrainians not being able to use Twitter - although the damage was already done
Other people bitched about it... But those guys aren't the greatest minds
People can either figure out how to spoof a number or go to signal like they're supposed to and stay away from telegram
