Hacker News new | past | comments | ask | show | jobs | submit login

See also: http://piratepad.net/30Dz8cCdv5 (Release Notes)

http://opiran.iranserv.com/ (Their chatroom)

http://www.mediafire.com/?6d8bh7w4c938m4j (The files)

http://piratepad.net/498yehfsdk (Discussions about vulnerable .ir servers)

http://piratepad.net/JAI223D1jp (Discussions about vulnerable .ir servers)

http://thenextweb.com/industry/2011/06/03/anonymous-steals-1... (News Article)




The second pirate pad is the most interesting (to me).

"2a. Suggestions on how to proceed I know that there is an urge to "run and gun" this, perhaps go on a mad defacing spree, or start dropping anonymous based UI icons into the site's buttons, guy fakes banners, etc. We must resist this urge. I think there is a tremendous opportunity if we get even 3 moderately popular anti-green sites. Let's look at sites A,B, and C. What we should consider, is the ability to plant stories inside A, link to them from B, and then plant stories in B, and link to A and B's stories from C - the site with the most traffic. The stories should be posted, if possible, two days ago, or yesterday, assuming a blog-like ability to set times and dates when you post. Anyway, do what suits, thiswas just a thought. We may not have the luxury of time, in which case raw vandalization may do it - just put green party banners on the home page, and "anonymous" in text at the copyright on the bottom - that is just so they don't blame the green party for the exploit."

Interesting. It seems to indicate that perhaps some of Anonymous' actors have matured, or at least were able to use the petty vandalism phase of the group as a learning process.

I can't help but feel like with Anonymous talking about planting fake news, the whole government/HBGary thing about planting fake news, etc. that in the near future there may be some (albeit minor) crisis on the internet about finding news you can trust. Until the internet figures out how to route around the damage, of course.


The discussions are particularly interesting. Goes over the methods employed with a few tools mentioned, vulnerable and possible targets.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: