Search History Skeptic
This is close to the tinfoil hat terrority, but what if: * hack target's corporate email * hack target's facebook * observe them (via webcams, etc) * generate psychological profile * plant search results https://www.google.com/search?q=hot+car+death+search * distract target with emails from the boss and facebook posts * target leaves kid in a hot car * target goes to jail. Much cleaner than drones or assassination. But where's the 'profit' part? There's got to be profit here somewhere... What, if any, defense is there to this kind of social engineering attack? * this message copyright 2014 Troy Benjegerdes, License fee for lawyers using this message in a criminal defense case is to donate 1% of legal fees to be split between the EFF and ACLU * (yes, I am shamelessly copyrighting this shit for profit, just like all the so called 'news' outlets are) -- ---------------------------------------------------------------------------- Troy Benjegerdes 'da hozer' hozer@hozed.org 7 elements earth::water::air::fire::mind::spirit::soul grid.coop Never pick a fight with someone who buys ink by the barrel, nor try buy a hacker who makes money by the megahash
Dnia poniedziałek, 30 czerwca 2014 11:02:53 Troy Benjegerdes pisze:
(yes, I am shamelessly copyrighting this shit for profit, just like all the so called 'news' outlets are)
That means nobody can copy the description, but the idea is perfectly copyable; what you would need is a patent. -- Pozdr rysiek
On Mon, Jun 30, 2014 at 07:12:20PM +0200, rysiek wrote:
Dnia poniedziałek, 30 czerwca 2014 11:02:53 Troy Benjegerdes pisze:
(yes, I am shamelessly copyrighting this shit for profit, just like all the so called 'news' outlets are)
That means nobody can copy the description, but the idea is perfectly copyable; what you would need is a patent.
Dangit, now I have to find a patent lawyer who likes trolling. Copyright addendum: anyone with a .pl email address can do whatever the hell they like to the referenced message, including remove my copyright. But only if they have publicly posted to cypherpunks. Lawyers still might get sued. There, fixed the license for you.
Dnia poniedziałek, 30 czerwca 2014 13:24:14 Troy Benjegerdes pisze:
On Mon, Jun 30, 2014 at 07:12:20PM +0200, rysiek wrote:
Dnia poniedziałek, 30 czerwca 2014 11:02:53 Troy Benjegerdes pisze:
(yes, I am shamelessly copyrighting this shit for profit, just like all the so called 'news' outlets are)
That means nobody can copy the description, but the idea is perfectly copyable; what you would need is a patent.
Dangit, now I have to find a patent lawyer who likes trolling.
Copyright addendum: anyone with a .pl email address can do whatever the hell they like to the referenced message, including remove my copyright. But only if they have publicly posted to cypherpunks.
Lawyers still might get sued.
There, fixed the license for you.
Much obliged. :) Now, that seems like something that would allow me to actually sublicense that work to anybody. So, here goes! Following message is based on a mail authored by Troy Benjegerdes, and is hereby licensed under CC By 3.0 unported. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - This is close to the tinfoil hat territory, but what if... - hack target's corporate email - hack target's social network - observe them (via webcams, etc) - generate psychological profile - plant search results https://www.google.com/search?q=hot+car+death+search - distract target with emails from the boss and social network posts - target leaves child in a hot car - target goes to jail. Much cleaner than drones or assassination. But where's the 'profit' part? There's got to be profit here somewhere... What, if any, defence is there to this kind of social-engineering attack? - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- Pozdr rysiek
The flip side of this is something we've been talking about doing for ages - an alibi generator service. Give it your keys and accounts, it'll generate a fake Google search for directions, create GPS coordinates of a trip to the store, purchase a sandwich, then write a review for the sandwich online, etc. etc. etc.. meanwhile, you're really hanging out at your underground cryptography book club, snoops none the wiser. R
participants (3)
-
Rich Jones
-
rysiek
-
Troy Benjegerdes