• Phoenixz@lemmy.ca
    link
    fedilink
    arrow-up
    62
    arrow-down
    2
    ·
    17 hours ago

    Nobody hacked anything

    People found account credentials and tried using them. Nothing nhogh tech here

    • Donkter@lemmy.world
      link
      fedilink
      arrow-up
      12
      ·
      3 hours ago

      Many hackers agree that the best way to hack someone is through social engineering to just have them tell you your password.

      • VitoRobles@lemmy.today
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 hour ago

        My favorite is when this security researcher showed on camera how she did it. She took out her laptop and pulled up a soundboard. She pretended to be mom with a crying baby, and begged the customer support to change her account email and reset her password. When they did try to ask for some verification, she played the baby crying sound effects louder. Feeling bad for her, they did what she asked and she “hacked” into the account.

    • boogiebored@lemmy.world
      link
      fedilink
      arrow-up
      8
      ·
      3 hours ago

      Hacking is very wide and can include things like this. It does not have to be as technical, hard or clever as most gatekeep it to be.

      Source: 20 years of experience in the space

      ex. password stuffing brute force is hacking

      • CeeBee_Eh@lemmy.world
        link
        fedilink
        arrow-up
        7
        arrow-down
        19
        ·
        5 hours ago

        That’s still not hacking. It’s “unauthorized access” like you said, or “gaining access”. Hacking requires bypassing some security measure or obtaining access through some technological or social engineering means.

        • The Quuuuuill@slrpnk.net
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          4 hours ago

          that’s still hacking. hacking is gaining unauthorized access to a system through:

          • social engineering
          • cypher breaking
          • brute force

          of the three the first is BY FAR the most common and efficient. it’s also the least sexy so they don’t make movies about it and the public perception is that it’s something else

          • CeeBee_Eh@lemmy.world
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            2 hours ago

            I agree with what you said. This also wasn’t social engineering. The password was just there and available.

            Also, the excellent and amazing movie Hackers features plenty of social engineering.

            Also, I didn’t say “excellent” and “amazing” sarcastically. It really is an under rated movie.

        • fallaciousBasis@lemmy.world
          link
          fedilink
          arrow-up
          8
          arrow-down
          1
          ·
          5 hours ago

          Unauthorized access is hacking.

          Doesn’t matter if a person has a computer with no password at all. If you are on their computer and you are not authorized to use their computer that is a crime.

        • Smoogs@lemmy.world
          link
          fedilink
          English
          arrow-up
          12
          arrow-down
          4
          ·
          5 hours ago

          you’re taking this splitting hairs to the moon today aren’t you, little troll.

          Talk about a hard derail to burry the lead.

          The thing everyone wants to see to dethrone this racist pile of shite and you’re over here like “it’s pronounced potato, not potato.”

  • fizzle@quokk.au
    link
    fedilink
    English
    arrow-up
    87
    arrow-down
    1
    ·
    19 hours ago

    Maybe I’m misunderstanding something because no one here has mentioned the obvious:

    Did we acquire the full unredacted set of his emails ?

    • REDACTED@infosec.pub
      link
      fedilink
      English
      arrow-up
      7
      ·
      5 hours ago

      From what I remember, the guy said that not much was left and most of the emails were deleted

    • ubersolver@lemmy.world
      link
      fedilink
      arrow-up
      61
      ·
      19 hours ago

      Seriously, wouldn’t this be kind of huge news if we suddenly had access to the evidence they tried to hide? Too bad this is a news article and someone probably changed the password by now.

    • tetrachromacy@lemmy.world
      link
      fedilink
      arrow-up
      34
      arrow-down
      2
      ·
      18 hours ago

      There’s no news on it and I have to assume it’s because if that is the full unredacted email there’s probably a ton of CSAM. If so it’s technically illegal to own and anyone who is downloading it might be opening themselves up to arrest or legal challenges, even if they’re a journalist.

      I would presume IF this is a full release of the Epstein GMail account, and IF it’s not a honeypot op of some kind from CIA/IDF/SVR/whoever, and IF it’s legit… then this is big. Nearly all American news orgs have been gutted though, and I doubt any billionaire that owns the news orgs would be ok with having their wealthy cohort exposed.

      Whoever might be investigating this would almost certainly keep quiet until all of their ducks are in a row because the second they publish, they’re going to be arrested for CSAM. Unless they’re in a country with no extradition treaty with the US. And even then they’ll be subject to extraordinary rendition cause Trump don’t care about US law, why would the lack of an extradition treaty stop him?

      • ubersolver@lemmy.world
        link
        fedilink
        arrow-up
        27
        ·
        18 hours ago

        It’s ridiculous that evidence of the crimes they committed is going to be used to arrest anyone who tries to uncover evidence of who committed those crimes. By ridiculous I don’t mean I don’t think it will happen. I think you are right about that.

        I mean, I know there are some people who would definitely do the wrong thing and that’s why it needed to be released carefully to avoid this kind of mess and why normally this kind of digging would be done by the government or trusted investigators, but it’s troublesome because the established power structure (regardless of party) are some of the same people who committed these crimes and we clearly can’t trust them to do the right thing.

  • Schwim Dandy@piefed.zip
    link
    fedilink
    English
    arrow-up
    158
    arrow-down
    4
    ·
    22 hours ago

    Soooooo, reading someone’s password then using it is “hacking” now?

    Yours,
    Schwim, Master Hacker

    • criss_cross@lemmy.world
      link
      fedilink
      arrow-up
      15
      ·
      15 hours ago

      Apparently the word “don’t” can also be found redacted.

      Because they did a regex for Don(.)T and didn’t bother to check

      • Coelacanth@feddit.nu
        link
        fedilink
        arrow-up
        6
        ·
        6 hours ago

        They did bother to check, they are just sloppy. It seems like it’s more that one slipped through the cracks. There are plenty of unredacted “don t” in the files. Looks like they did blanket redactions of “Don T” (and other Trump related names) and then went through manually and unredacted false positives to cover their tracks. But they missed one. It’s still a smoking gun, though, as there’s literally no reason to redact “don t”.

    • P1k1e@lemmy.world
      link
      fedilink
      arrow-up
      39
      ·
      21 hours ago

      They were so busy hunting for the rapists they completely forgot about passwords…or we’ve got some decent folks weaponizing “incompetence”

      • CainTheLongshot@lemmy.world
        link
        fedilink
        arrow-up
        23
        ·
        20 hours ago

        I’m convinced they used AI to redact everything, and didn’t double back and check them until after a particular page made headlines.

        I’ve seen numerous videos where they program a script to remove the 5-6 different ways “redactions” were added and they make no sense from a technical stand point, leaving me to believe that someone non-technical told AI exactly how they wanted to redact, and then put those files in their outbox.

        • NotSteve_@piefed.ca
          link
          fedilink
          English
          arrow-up
          12
          ·
          16 hours ago

          They uploaded the Bash 3.3 reference manual and even that had some redactions so your theory is almost definitely correct

        • P1k1e@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          18 hours ago

          Yea this is highly likely… I can’t imagine how they made it this far being so… Fukkin dum