Oct 20

- Tough on trolls: UK internet abusers may face up to 2 years in jail (RT, Oct 19, 2014):

Internet trolls could face two years behind bars if new tough legislation “to combat cruelty” is adopted, according to UK Justice Secretary Chris Grayling.

That’s four times the current six-month prison term and would proove the government’s zeal to “take a stand against a baying cyber-mob,” Grayling told The Daily Mail.

“These internet trolls are cowards who are poisoning our national life. No one would permit such venom in person, so there should be no place for it on social media. That is why we are determined to quadruple the current six-month sentence,” Justice Secretary added. Continue reading »

Tags: , , , , , , ,

Oct 15

From the article:

“But she did learn that Snowden was running more than one Tor exit node, and that he was trying to get some of his buddies at “work”to set up additional Tor nodes…

H’mmm….So Snowden running powerful Tor nodes and trying to get his NSA colleagues to run them, too?

I reached out to Sandvik for comment. She didn’t reply. But Wired’s Poulsen suggested that running Tor nodes and throwing a crypto party was a pet privacy project for Snowden. “Even as he was thinking globally, he was acting locally.”

But it’s hard to imagine a guy with top secret security clearance in the midst of planning to steal a huge cache of secrets would risk running a Tor node to help out the privacy cause. But then, who hell knows what any of this means.

I guess it’s fitting that Tor’s logo is an onion — because the more layers you peel and the deeper you get, the less things make sense and the more you realize that there is no end or bottom to it. It’s hard to get any straight answers — or even know what questions you should be asking.

In that way, the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.”

That’s how you can easily know that you may be investigating a CIA/NSA project run by TPTB.

Everything with them is utterly and totally compartmentalized.

NWO-Illuminati-All-Seeing-Eye-Novus-Ordo-Seclorum


tor-logo

- Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government (Pando Daily July 16, 2014):

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.”—Roger Dingledine, co-founder of the Tor Network, 2004

***

In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity. Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Oct 13

FYI.


- ‘Hostile to privacy’: Snowden urges internet users to get rid of Dropbox (RT, Oct 12, 2014):

Edward Snowden has hit out at Dropbox and other services he says are “hostile to privacy,” urging web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying on them in increasingly intrusive ways.

“We are no longer citizens, we no longer have leaders. We’re subjects, and we have rulers,” Snowden told The New Yorker magazine in a comprehensive hour-long interview. Continue reading »

Tags: , , , , , , , , , ,

Sep 11

net-neutrality

- Net Neutrality (Save The Internet):

On Jan. 14, 2014, the U.S. Court of Appeals in Washington, D.C., struck down the Federal Communications Commission’s Open Internet Order.

And on May 15, the FCC voted to propose a new “open Internet” rule that may let Internet service providers charge content companies for priority treatment, relegating other content to a slower tier of service.

Under these rules, telecom giants like AT&T, Comcast and Verizon would be able to pick winners and losers online and discriminate against online content and applications.

We must stop the FCC from moving forward with these rules.

Here’s how we got here: Continue reading »

Tags: , , , , , , ,

Sep 04

Apple

- Apple Doesn’t Take Customer Security Seriously – 5 Irresponsible and Shocking Lapses (Liberty Blitzkrieg, Sep 3, 2014):

I’m the furthest thing in the world from a technology or security expert, but what I have learned in recent years is that a dedicated, sophisticated and well funded hacker can pretty much own your data no matter how many precautions you take. Nevertheless, the major technology companies on the planet shouldn’t go out of their way to make this as easy as possible.

In the wake of the theft of private images from several prominent celebrities, many people are rightly wondering whether how vulnerable their data is. The answer appears to be “very,” and if you use Apple, the following article from Slate may leave you seething with a sense of anger and betrayal.

David Auerbach wrote the following for Slate. Read it and weep: Continue reading »

Tags: , , ,

Aug 30

legolas

- “A Man of Many Perversions” – Federal Cybersecurity Head Convicted of Child Porn Charges (Liberty Blitzkrieg, Aug 29, 2014):

The following story is a warning as to why centralized power is so dangerous. It doesn’t matter whether the power is political or corporate, overly centralized power in all forms must be resisted whenever it appears. The worst of all worlds is when centralized political and corporate power unite in an unholy alliance, which is what has happened to America in recent decades. When this occurs, the combined forces of oligarchy simply begin to rapaciously feast on the citizenry with zero accountability. This is a fair description of the United States in 2014. Continue reading »

Tags: , , , , , , ,

Aug 23

- Facebook given deadline in ‘largest privacy class action in Europe’ (RT, Aug 22, 2014):

Facebook has been given four weeks to respond to a class action, launched against it by an Austrian activist and supported by 60,000 users. The suit claims Facebook violated users’ privacy, by cooperating with the NSA’s PRISM program.

The class action initiated by Max Schrems, an Austrian lawyer, data privacy activist and founder of Europe vs. Facebook group has passed its first review in the Vienna Regional Court.

Facebook Ireland, which runs the social network’s activities outside the US and Canada, has been given four weeks to respond to the action.

The order is very likely on the way to Facebook. The first step in the legal procedure is hereby taken,” said a statement by Europe vs. Facebook on Thursday

The group has described the suit, joined by 25,000 users, as “the largest privacy class action in Europe” and specified that 35,000 more users have registered on www.fbclaim.com, expressing their will to join the action should it expand. Continue reading »

Tags: , , , , , , ,

Aug 21

- Russia Forces Its Popular Bloggers to Register — Or Else (Bloomberg, Aug 19, 2014):

Russian President Vladimir Putin is taking names. Potentially thousands.

The former KGB colonel, concerned with how social media can be used to undermine his authority, this month expanded his regulation of media to the blogosphere, requiring those with at least 3,000 daily readers to register their real names and contact information. So far, about 580 bloggers in Russia have applied to register with the country’s communications regulator Roskomnadzor.

The government says this is needed so it can remove inaccurate or defamatory information on the Internet. But some bloggers fear it will limit free speech, allow Putin to close down blogs he doesn’t like and give him an excuse to block sites such as Twitter in the future.

The total number of bloggers who are required to register may be several thousand. Roskomnadzor may shut down the accounts of those who don’t follow the new rule. Roskomnadzor sent Eduard Limonov and Boris Akunin, who are known for their opposition to the government, requests to register their blogs, according to the daily newspaper Izvestia. Continue reading »

Tags: , , , , , , ,

Aug 20

- Truth seekers rushing to Diaspora and Unseen.is to escape censorship of corporate-run social media (Natural News, Aug 19, 2014):

Share this alert with everyone you know in alternative media, natural health, honest journalism and truth-seeking: The era of “mainstream social media” (i.e. Facebook, etc.) as a trusted social media hub is coming to a close. As everyone has noticed by now, Facebook selectively censors posts based on their keyword content, suppressing truthful information about natural cures, GMOs, mercury in vaccines and even cancer prevention strategies.

Everyone in the truth movement now fully realizes that corporate-run social media will always be controlled by corporate interests. Thus, it is useless for the kind of honest investigative journalism the world really needs right now in this era of unprecedented information oppression and propaganda. An alternative social sharing network has long been sought which could serve as a trusted, independent, non-corporate gathering place for truth seekers.

We have now identified two online organizations which serve this purpose. They are both rooted in open-source programming, freedom of information and individual liberty. They run on donations (so be sure to donate to them, see below) and therefore are not beholden to the interests of powerful corporations. Continue reading »

Tags: , , ,

Aug 19

GCHQ headquarters

- Masters of the Internet: GCHQ scanned entire countries for vulnerabilities (RT, Aug 18, 2014):

GCHQ is scanning servers in multiple foreign countries for vulnerable ports, according to German newspaper Heise. Using a tool called Hacienda, the intelligence agency seeks to ‘master the internet’ for sources of espionage.

Spanish for estate, Hacienda can port scan all of the servers in a country to provide information on user endpoints and scan for potential vulnerabilities. The ability to port scan is not new, but the scale of its use by government spies, with 27 countries scanned by 2009, has shocked many familiar with the software.

“In 2009, the British spy agency GCHQ made port scans a ‘standard tool’ to be applied against entire nations,” Heise reports. “Twenty-seven countries are listed as targets of the Hacienda [program].” Continue reading »

Tags: , , , , ,

Aug 16

Privacy-Black-Paper

PDF: NSA-Black-Paper

- CIA spies on Senate. Here’s how to take back your digital privacy [FREE] (Sovereign Man, Aug 14, 2014):

Back in March serious allegations came out of the Senate that the CIA was monitoring and even hacking Senate computers. They were denied vehemently at the time by CIA director John Brennan, who went so far as to say “that’s just beyond the scope of reason.”

Unsurprisingly, of course, the CIA has now come out saying that, yes, they did in fact spy on Senate aides’ computers. Oh, and that they’re sorry. Very sorry.

This is stuff that would have been a major scandal not too long ago, causing a public outcry for the heads of those responsible.

Today, it seems par for the course. It’s taken for granted that governments around the world, spearheaded by Uncle Sam, monitor communication via email, phone, social networks, webcam etc. en masse. Continue reading »

Tags: , , , , , , , , , , ,

Aug 03


Added: Jun 1, 2014

Cable companies are trying to create an unequal playing field for internet speeds, but they’re doing it so boringly that most news outlets aren’t covering it.
John Oliver explains the controversy and lets viewers know how they can voice their displeasure to the FCC.

(www.fcc.gov/comments, for any interested parties)

Tags: , , , , , , ,

Jul 19

- How British Spies “Seed the Internet With False Info, Control YouTube Pageviews and Manipulate Online Polls” (Liberty Blitzkrieg, July 16, 2014):

Thanks to Edward Snowden, we now have proof about an incredible set of tools used by the British equivalent of the NSA, known as the GCHQ, or Government Communications Headquarters. These tools will essentially confirm every single conspiracy theory you could have ever imagined when it comes to propaganda on the Internet. It allows British intelligence officers to: “manipulate the results of online polls, artificially inflate pageview counts on web sites, ‘amplify’ sanctioned messages on YouTube, and censor video content judged to be ‘extremist.’”

Being the creative folks that they are, GCHQ even came up with code words to describe each “product.” These include, UNDERPASS (for poll manipulation), SILVERLORD (for censorship), GESTATOR (for the manipulation of YouTube views), PREDATORS FACE (for DDOS attacks), the list goes on…

Glenn Greenwald writes at The Intercept that: Continue reading »

Tags: , , , , , ,

Jul 17

Dianne-FeinsteinOrganized crime

- Meet CISA – Dianne Feinstein’s Latest Attack on Privacy, Civil Liberties and the Internet (Liberty, Blitzkrieg, July 15, 2014):

There’s not much good you can count on Congress to accomplish, but when it comes to introducing and passing oligarch protecting, civil liberties destroying legislation, our “representatives” are absolutely relentless in their determination. Unsurprisingly, the only “distinctly native American criminal class,” as Mark Twain described Congress, is at it again when it comes to institutionalizing spying and attempting a legal run around the Bill of Rights.

One thing that has become crystal clear since the Edward Snowden revelations, is that much of Congress has no problem at all with unconstitutional spying. Rather, they are primarily upset it was exposed and are dead set on making sure no other whistleblower can ever do the same. Enter CISA, or The Cybersecurity Information Sharing Act.

I’ve spent much of today reading about the bill, and have compiled what I think are the most astute observations. First, from the ACLU: Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Jul 15

gchq-spying-internet-tools

- Snowden files: Manipulating polls, netting from LinkedIn and YouTube in GCHQ’s bag of tricks (RT, July 14, 2014):

The UK’s spy agency has developed a number of crafty tools to monitor and comb the web, planting false information when necessary, Glenn Greenwald said while disclosing a fresh batch of Snowden’s files.

The tools were created by the Joint Threat Research Intelligence Group (JTRIG) within the Government Communications Headquarters (GCHQ), according to the leaked documents.

Previous files have already detailed JTRIG’s use of “fake victim blog posts” and “false flag operations,” as well as “honey traps” and various forms of psychological manipulation of online activists.

But the newly released GCHQ document, titled ‘JTRIG Tools and Techniques,’ gives a more comprehensive view of the scale of the operations, including how invasive they can be and how much online havoc can be caused. Continue reading »

Tags: , , , , , , ,

Jul 13

- Twitter uproar over pic of ‘applauding’ Israelis watching night attacks on Gaza (RT, July 12, 2014)

Tags: , , , , , , , ,

Jul 06

NSA intercept 2

- What Your “Startlingly Intimate, Voyeristic” NSA File Looks Like (ZeroHedge, July 6, 2014):

A few days ago, we asked a simple rhetorical question: “Are you targeted by the NSA?

The answer, sadly for those reading this, is very likely yes, as it was revealed that as part of the NSA’s XKeyscore program “a computer network exploitation system, as described in an NSA presentation, devoted to gathering nearly everything a user does on the internet” all it takes for a user to be flagged by America’s superspooks is to go to a website the NSA finds less than “patriotic” and that user becomes a fixture for the NSA’s tracking algos.

So assuming one is being tracked by the NSA – or as it is also known for politically correct reasons “intercepted” – as a “person of interest” or worse, just what kind of data does the NSA collect? The latest report by the WaPo titled “In NSA-intercepted data, those not targeted far outnumber the foreigners who are” sheds much needed light on just how extensive the NSA’s data collection effort is.

According to WaPo, the files on intercepted Americans “have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless.”

The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , ,

Jul 04

Flashback:

- Facebook founder called trusting users ‘DUMB FUCKS’ (The Register)

Related info:

- Facebook Mind-Control Experiments Linked To DoD Research On Civil Unrest

- Was The Department Of Defense Behind Facebook’s Controversial Manipulation Study?

- Facebook’s Secret Mood Manipulation Experiment


Facebook's COO Sandberg attends an interactive session organised by the ladies' wing of industry lobby group FICCI in New Delhi
Facebook’s Chief Operating Officer (COO) Sheryl Sandberg (Reuters/Adnan Abidi)

- Journal that published Facebook psych study sorry…social network not (RT, July 4, 2014):

The journal that has published the Facebook mood swings study regrets the way the study was conducted. Facebook issued a sorry statement for accessing the content of 700,000 people’s pages, but the company’s second-in-command said she has no regrets.

It was concluded by the Proceedings of the National Academy of Sciences journal that the move to manipulate the content appearing on the Facebook pages of about 700,000 people without their prior consent may have violated some principles of academic research. Continue reading »

Tags: , ,

Jul 03

- Google Has Received 250,000 Article Removal Requests as Internet Censorship Takes Off in Europe (Liberty Blitzkrieg, July 3, 2014):

“In the walls of the cubicle there were three orifices. To the right of the speakwrite, a small pneumatic tube for written messages, to the left, a larger one for newspapers; and in the side wall, within easy reach of Winston’s arm, a large oblong slit protected by a wire grating. This last was for the disposal of waste paper. Similar slits existed in thousands or tens of thousands throughout the building, not only in every room but at short intervals in every corridor. For some reason they were nicknamed memory holes. When one knew that any document was due for destruction, or even when one saw a scrap of waste paper lying about, it was an automatic action to lift the flap of the nearest memory hole and drop it in, whereupon it would be whirled away on a current of warm air to the enormous furnaces which were hidden somewhere in the recesses of the building.He who controls the past controls the future. He who controls the present controls the past.”

– From George Orwell’s 1984

The reason Big Brother and his band of technocrat authoritarians spend so much time and effort erasing history in the classic novel 1984, is because they are a bunch of total criminals and they know it. Their grip on power is made so much easier if the proles are kept ignorant, confused and in the dark. This strategy is not just fiction, it is the philosophy of tyrants and authoritarians throughout history. Continue reading »

Tags: , , , , , ,

Jul 03

- NSA whistleblowers testify in Bundestag inquiry, disclose ‘totalitarian’ surveillance  (RT, July 3, 2014):

Former NSA agents-turned-whistleblowers are testifying before a German parliamentary committee as the Bundestag investigates America’s wiretapping methods with one of them branding the NSA approach “totalitarian.”

It is hoped that evidence from the two US citizens, William Binney and Thomas Drake, will shed light on the methods of surveillance used by the American National Security Agency (NSA), which eavesdropped on the mobile phone of German Chancellor Angela Merkel and other leading German and European politicians.

Binney and Drake broke their silence long before ex-NSA employee Edward Snowden leaked revelations about American intelligence agencies’ practices last year.

Tags: , , , , , , , , , , , , , , ,

Jul 03

How NSA tracks all German Tor users as extremists

- XKeyscore exposed: How NSA tracks all German Tor users as ‘extremists’ (ZeroHedge, July 3, 2014):

The NSA has been revealed to mark and consider potential “extremists” all users of the internet anonymizer service Tor. Among those are hundreds of thousands of privacy concerned people like journalists, lawyers and rights activists.

Searching for encryption software like the Linux-based operating system Tails also places you on the NSA grid, as Lena Kampf, Jacob Appelbaum and John Goetz revealed on the German site Tagesschau. The report is based on analysis of the source code of the software used by NSA’s electronic surveillance program XKeyscore.

Tor is a system of servers, which routes user requests through a layer of secured connections to make it impossible to identify a user’s IP from the addresses of the websites he/she visits. The network of some 5,000 is operated by enthusiasts and used by hundreds of thousands of privacy-concerned people worldwide. Some of them live in countries with oppressive regimes, which punish citizens for visiting websites they deem inappropriate.

But merely visiting Tor project’s website puts you on the NSA’s red list, the report says. But more importantly it monitors connections to so-called Directory Authorities, the eight servers, which act as gateways for the entire system. The NSA was particularly surveilling German-based Tor Directory Authorities. One is operated by the Germany-based hacker group Chaos Computer Club, the other by computer science student Sebastian Hahn, who told journalists that the revelation is “shocking.” Continue reading »

Tags: , , , , , , , , , , , , ,

Jul 02

Sure!


nsa-321

- NSA’s internet surveillance program is constitutional, Obama’s panel of experts insists (RT, July 2, 2014):

A five-person panel handpicked by US President Barack Obama concluded Tuesday that the National Security Agency’s use of a Foreign Intelligence Surveillance Act provision to spy on non-Americans is not unjust.

Nevertheless, the Privacy and Civil Liberties Oversight Board’s findings — published late Tuesday in a 196-page pre-release report that was approved by the panel early Wednesday — did acknowledge that substantial flaws exist in the way the NSA uses Section 702 of the FISA Amendments Act to conduct surveillance against not US-persons believed to be located abroad. Continue reading »

Tags: , , , , , , , , , , , , , , ,

Jul 02

facebook-mind-control-social-engineering

- Facebook mind control experiments linked to DoD research on civil unrest (RT, July 2, 2014):

Facebook’s experiment on over half-a-million unsuspecting users has taken a new twist with the revelation that a researcher connected to a Department of Defense-funded program to use the military to quell civil unrest also participated in the study.

Social media sites exploded over the weekend after it was revealed that Facebook, no stranger to controversy of late, secretly manipulated posts being seen by nearly 700,000 users in 2012 in order to allow researchers to study how emotional states are transmitted over the platform.

Results of the week-long study conducted by researchers at Facebook, Cornell University, and the University of California appeared in the June edition of the journal ‘Proceedings of the National Academy of Scientists’ (PNAS) under the rather insidious title, ‘Experimental evidence of massive-scale emotional contagion through social networks’. Continue reading »

Tags: , , , , , , , , , , , , , ,

Jul 02

Yes, it is difficult to guess who really is behind CIAbook.

Flashback:

- Facebook founder called trusting users ‘DUMB FUCKS’ (The Register)


- Was The Department Of Defense Behind Facebook’s Controversial Manipulation Study? (Liberty Blitzkrieg, July 1, 2014):

I’ve spent pretty much all day reading as much as possible about the extremely controversial Facebook “emotional contagion” study in which the company intentionally altered its news feed algorithm to see if it could manipulate its users’ emotions. In case you weren’t aware, Facebook is always altering your news feed under the assumption that there’s no way they could fill your feed with all of your “friends’” pointless, self-absorbed, dull updates (there’s just too much garbage).

As such, Facebook filters your news feed all the time, something which advertisers must find particularly convenient. In any event, the particular alteration under question occurred during one week in January 2012, and the company filled some people’s feeds with positive posts, while others were fed more negative posts.

Once the data was compiled, academics from the University of California, San Francisco and Cornell University were brought in to analyze the results. Their findings were then published in the prestigious Proceedings of the National Academy of Sciences. They found that: Continue reading »

Tags: , , , , , , , , , , , , , ,

Jun 26

snooper-charter-uk-powers

- ‘Snooper’s charter': UK govt pushes for access to social media (RT, June 26, 2014):

Britain’s Home Secretary is pushing for new spying powers to access social media and email accounts. Theresa May argues that it’s a “matter of life and death,” and has dismissed claims the government wants to spy on citizens.

The British Home Office is pushing for changes to the law that would radically expand powers to monitor citizens. The communications data bill, which has been branded ‘the snooper’s charter’ by opponents, would allow authorities access to Facebook, Twitter and Instagram accounts.

In addition, services like Facetime and Skype would also be accessible to the UK authorities. Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Jun 26


Added: Jun 25, 2014

Description:

Message fror Patrick Henningsen regarding UK censorship of UK Column, one of Britains leading alternative news websites…

UK Column is shutting down! British Gov’t has threatened UK Column with 250K in fines to regulate their YouTube channel, govt now claiming YouTube is “video on demand”. Everyone talks about “when they shut down the internet” – and here it is, govt regulation of YouTube content! Please get behind them in this fight… Continue reading »

Tags: , , , , , ,

Jun 24

google111

- ‘You are unauthorized’: Nearly 50% of EU organizations deny access to personal data (RT, June 24, 2014):

Four out of ten organizations obstruct citizens from accessing their own personal data, says a recent study. Companies like Google, Facebook and Twitter also fail to fulfill their duty to be transparent.

The international study, conducted by experts from the University of Sheffield, has inspected at least 327 organizations across Europe, including the UK, Norway and Germany. Continue reading »

Tags: , , , , , , , ,

Jun 14

- Iraq blocks Twitter, Facebook, YouTube amid growing ISIS threat (RT, June 13, 2014):

The Iraqi government has blocked access to top social media sites like Facebook and Twitter, reportedly to hinder the activities of militants formerly associated with Al-Qaeda. Meanwhile, thousands are signing up to fight the jihadist insurgency in Iraq.

Numerous media reports citing journalists and open-internet advocates said that internet users in Iraq are getting block screens when trying to access top social media sites and Google. Continue reading »

Tags: , , , , , , , , , ,

Jun 14

- Why Online Tracking Is Getting Creepier (ProPublica, June 12, 2014):

The marketers that follow you around the web are getting nosier.

Currently, many companies track where users go on the Web—often through cookies—in order to display customized ads. That’s why if you look at a pair of shoes on one site, ads for those shoes may follow you around the Web.

But online marketers are increasingly seeking to track users offline, as well, by collecting data about people’s offline habits—such as recent purchases, where you live, how many kids you have, and what kind of car you drive.

Onboarding: a ProPublica explainer of how online tracking is getting creepier. Follow ProPublica on Vine for more explainer shorts. (Icons courtesy of Lil Squid, André Renault, Gabriele Garofalo and Patrick Morrison, Noun Project)

Here’s how it works, according to some revealing marketing literature we came across from digital marketing firm LiveRamp: Continue reading »

Tags: , , ,

Jun 12

- Massive flaw could have exposed every Gmail user’s address (RT, June 12, 2014):

A gaping security bug in Google’s systems may have been used to unearth millions upon millions of users’ email addresses. The activist claimed it took Google a month to rectify the problem after his report to the company.

Tel Aviv-based security researcher Oren Hafif discovered the bug and has informed Google, which has managed to resolve the problem.

However, before Hafif notified Google, he successfully retrieved some 37,000 addresses from the system.

“I have every reason to believe every Gmail address could have been mined,”
Hafif told Wired.

He uploaded a video tutorial to his YouTube account at the beginning of June.

Continue reading »

Tags: , , , ,