You are viewing a single comment's thread.

view the rest of the comments →

cronnron ago

I wanted to weigh in here, because I was in the PG matrix chats at the time this was happening. The access details to the site (pictured) were shared with the chat participants. The .zip files in the screenshot were not able to be downloaded without individual passwords. However, within a few minutes, an unsecured Amazon mirror containing files with identical filenames was found and those files were downloaded and inspected. The files were not actually .ZIP archives but renamed .PDF files. They contained copy-editor corrections ("proofs" ) to Comet's restaurant pizza menu, apparently from a graphics/web designer.

Edit (forgot the screenshot link): https://kek.gg/i/3wJF5H.png

Think rationally and let's break it down: Look at the file sizes in the screenshot (look!). We see files of about 11 Mb, and some at 19 Mb, and biggest at 23 Mb. Notice how several of these files have sizes that are similar with only small byte differences? It's because they are multiple versions of the same file(s), PDF menus for the restaurant, and other mundane things.

Why is it password protected? I can only speculate, but it's not uncommon for designers to give their clients a private area to view changes to things that aren't ready for printing/production/publication.

I have to doubt the validity of claims that this 'hacker' found "evidence" of CP, since that's exactly what everyone else in the PG matrix chat was also looking for (at the time when this unfolding) and nothing particularly interesting was found by others in the chat.

Also, why would anyone link CP (even it were password protected) to their business website? I can't believe anyone would be smart enough to evade detection and then be that stupid as to link right to the thing they're trying to hide.. Makes zero sense.