I call it agnosticI don't know. There is no shortage of lefty media types trying to find ANYTHING. So I'm maybe surprised there's nothing yet? But that doesn't mean it won't be found someday.
You see, my position is known as tolerant.
I call it agnosticI don't know. There is no shortage of lefty media types trying to find ANYTHING. So I'm maybe surprised there's nothing yet? But that doesn't mean it won't be found someday.
You see, my position is known as tolerant.
It's not?, then how did they narow down SQL database replication?
Yes, but what protocols were involved? The protocol information immediately tells you what sort of data was being shared.
Syncing can simply mean that emails were being exchanged, SMTP or POP3 for the uneducated.
Also Joe, none of this is verified as according to the article itself. It's simply unverified implication coming from unverified implicators.
It's basically dungeon and dragons for government tampering.
Meaning that they explained this, without actually breaking down the most important aspects?Syncing under a database-type protocol matches up with the connection times they saw; these people work intimately with databases, and understand how communications look like. Regardless of the 'protocol' used, the damning aspect is that they were sharing and syncing info. And the connection patterns, if the data are as described by these hackers, is rather compelling.
Natty's become the anti-Oit. Better get used to it because he's not going anywhere.
How did they gain access to said private LANS? What programs did they use to intercept data packets? Did they do this legally? And the most important question,..where is the hard data that proves any of this?
Except that the dude who apparently analyzed this seems to tweet/have ties with Th3J35st3r3301. And that guy seems to have some serious hacking skills.....perhaps this was one of the 'nuggets' that little band of Merry Men has been sorting out.....