You are viewing a single comment's thread.

view the rest of the comments →

virge ago

@thewebofslime, a line of inquiry:

I have all of the Collections.

https://www.intego.com/mac-security-blog/collection-1-and-2-5-are-the-latest-massive-password-dumps/

How? I asked you this question once and you never responded. These aren't just public, you can't go to their site and get the database. That's valuable data, worth money on various open markets. How did you obtain it?

 

So, you accused me of being a shill, but I have a little mini RICO database of shills that I will "thot audit." I have a couple of lawyers going over what I've got and a computer science professor from the UC system to provide expert insight.

  1. Please elaborate on the term "mini RICO database of shills that I will "thot autit."
  2. Why are you hiring attorneys to investigate data you've collected? What is the purpose of spending money on this?

 

My thesis, which I required the help of two non-pizzagaters to uncover (they do not believe in it, at all), is that a person used a CACI company device to visit the pizzagate thread, then came to the site and started low level attacks from their own device, before moving onto a series of more sophisticated atrtacks.

Please clarify the involvement and assessment of CACI. Is CACI a NGO, or just a CIA front? It smells about as legitimate as USAID. Of course, I could be wrong. Just curious.

 

@Crensch referral tag is rudimentary website child's play. From a technical perspective I see nothing that merits objection about this. Please illuminate me as to your complaint.

Same observation for "he probably made his own website". I don't see anything malign.

The Vindicator section is not enough corroboration. Unless I missed something, he's making an educated guess on 2 minutes. That's about as accurate as flipping a coin, @webofslime?

 

indirectly admits to using stolen credentials to send emails, in addition to email spamming https://archive.fo/siuMv#selection-3513.0-3513.229

I don't see this at all. He never says he uses stolen credentials. He admits to e-mail spamming, yes, but he's e-mail spamming a list of CNN and Government e-mail addresses. He's waging a war against CNN. What's not to like?

 

using alts in same conversation https://archive.fo/YY6lH#selection-6015.0-6103.312

@thewebofslime, what is the purpose of @followthemoney, and why separate the accounts?

The vernacular used by the accounts matches.

 

claims usernames/passwords are public info https://archive.fo/POQ6l#selection-4471.0-4471.113

IF @thewebofslime is @followthemoney, then this has the appearance of a albeit somewhat arrogant over-exaggeration for the aggregate. From a technical perspective, he's right - most peoples passwords have leaked by now and most people use a lot of repeat passwords. A staggering, disgustingly amount of people. It's common modern OpSec to never re-use passwords and to have cypher's or variants because of this.

@crensch, if anything this is sound technical observation and my only complaint is he's not even bothering to educate directly and seems mostly indignant he'd have to. Frankly, I would, too.

 

claims doxxing material deleted by kevdude (https://archive.fo/JqHR4#selection-4857.0-4863.34), when it was done by Voat ( https://archive.fo/CWDo6#selection-1613.0-1613.57)

@thewebofslime, can you explain the discrepancy? Was this a mistake, assumption, or is something not readily apparent by the logs?

 

holds criminal/doxxing material of Voat users https://archive.fo/TuvzR#selection-4187.0-4189.188

@crensch I see what @thewebofslime is saying here, and calling it "holds criminal/doxxing material" is a large stretch of the imagination.

The guy basically said she doxxed first, so he retaliated. Help me see why this isn't equalization of force to combat a threat.

SandHog ago

IF @thewebofslime is @followthemoney, then this has the appearance of a albeit somewhat arrogant over-exaggeration for the aggregate.

It is. Definitely is. The whole kerfuffle with this guy started because he didn't want to follow the submission guidelines to v/pizzagate and proceeded to flip out and accuse Vindicator of being a shill and then proceeded to ask if it was ok to dox him. Of course the response to that was much like what you see here. It appears that only reinforced his preconcieved notion that pizzagate was comped and he proceeded to spread that bullshit (before his 'investigation' was even completed mind you) all over reddit and the chans. And he has no idea why those of us involved with pizzagate and saw all this shit first-hand don't trust him.

I've gone around and around with the guy in an attempt to resolve this issue and he simply ignores everything and continues on with whatever game he is playing.

virge ago

And your candid opinion on the rest of my line of inquiry?

SandHog ago

I have no idea when it comes to what he says about the activity on his website. I strongly suspect that I am one of the names on his little 'thot audit' list because I challenged his conclusions as they amounted to nothing more than Vindicator posting a reply to his thread around the same time the alleged 'CACI intrusion' occurred. The only evidence we have of the 'CACI' attack occuring was some copy pasted logs that could have easily been faked. I do not know if that was the case or not but the evidence essentially hinged on a timing coincidence.

I started out defending the guy in this whole thing. I waited for him to present his evidence but that was the sum total of it implicating Vindicator. Vindicator posting a comment around the same time someone allegedly tried to run a clumsy injection attack on his website. Maybe someone did. Maybe they didn't. I don't know. What I do know is that my efforts to smooth things over and get to the bottom of things have been for naught and consequently I am left to believe he has not been dealing in good faith.

As for all the technical stuff @MadWorld would be much more suited to answer that than I am.

thewebofslime ago

Why make false accusations and lie?

I strongly suspect that I am one of the names on his little 'thot audit' list because I challenged his conclusions

You misstated my evidence and conclusions. My primary evidence was a list of IamQ email addresses with the same exact passwords as a vindicator email address that coincided with the user that probed my site form a CACI device. The timing was immediately after @vindicator insulted me repeatedly and called me a shill, first. The attack happened within minutes, resulting me researching what happened, which turned up a shill farm of IamQ email addresses. @Vindicator also dug up an ancient @IamQ post.

as they amounted to nothing more than Vindicator posting a reply to his thread around the same time the alleged 'CACI intrusion' occurred.

This statement is patently false. "Around the same time" misrepresents all of the other evidence and the logs as well as "within a couple of minutes." That is not "around the same time" it was exactly the same time.

The only evidence we have of the 'CACI' attack occuring was some copy pasted logs that could have easily been faked.

Accept there is a tie to IamQ email addresses. Also, publicly available information regarding the email and passwords confirms this. I specifically presented evidence that nobody had to take my word for... that they could look up themselves. "Goatblower" on an email tied to a Voat account is more than circumstantial.

I do not know if that was the case or not but the evidence essentially hinged on a timing coincidence.

Super, super false. Why are you lying?