I'm not sure what's up with the sudden rash of posts about supposed pedo logos and codes:
Spurring researchers into witch-hunting companies and organizations based on logo shapes alone is a disinfo tactic we've seen used to delegitimize the pizzagate investigation in the past. It has been used as an excuse to label us "extremists", to justify account suspensions, and to bury legit research with much more suspicious evidence of pedo-friendliness than a mere logo or potential coded language.
This is why a logo by itself is not enough to satisfy Rule 1.
Given the truther purges on YouTube and Twitter recently,
this trend should be raising the hair on people's necks. Stay frosty, people!
@think- @ben_matlock @EricKaliberhall @blacksmith21
view the rest of the comments →
Blacksmith21 ago
@vindicator - It's probably a good time to note that it won't be long until we come under DDOS or worse attacks. We've largely escaped scrutiny so far, but we may see new TTPs which will involve getting us to link on CP. Or worse, link to malscripting sites which can place scripts that can plant CP on the local user.
OPSEC is the trite phrase here. If you are a serious researcher and not using a Tor + VPN, then you are at risk.
Vindicator ago
Blacksmith, this is a very, very good point. Can you put together a fresh thread walking people through a security review "for dummies"? I know we've had good ones in the past but I don't have time to dig them up right now.
Blacksmith21 ago
After my dinner arrives....