Rough Draft:
I don't want to spend all day on this, so I'm doing a rough draft tonight so people can look it over. I've got family around, articles to write that have nothing to do with Web of Slime and a podcast to prepare for, tomorrow. I don't want to dox anyone. I have not threatened to dox anyone. I just want the best way to present evidence, but everyone is too busy being insulting. Here is my rough draft and if everyone thinks it's okay for me to fill in these blanks, I can do that. Just know... it IS a bit of doxxing. If you have suggestions on how to edit images appropriately what to leave in, what to leave out... etc. I'm all ears. If you know someone who knows about web security... might be a good person to have look at this.
I am ready to present proof in a reasonable manner, but I would like some input first.
Also, I finally had some movement on the Flaherty thing and I REALLY want to start with that. That is going to be way more fun for me.
Keep in mind, this is the first time I've ever made a website. I don't really know much about it and you can see my site.google.com where I started. I've never had to deal with this, I've only heard about it. I've come a long way in three years, but I am going to use someone who knows more to help explain this.
- Google Analytics, who watches everyone, sees a visitor go from the Pizzagate thread TO my site. In fact, it was more traffic than my site had ever seen. You can see where everyone is coming from:
https://i.imgur.com/N3rto6v.png
So, factually, Google allows me to see that someone came from my thread to my site. It is a FACT that someone with XXXXXXXX IP address went from my thread on Voat TO my site.
-
It is a FACT that this was within minutes of Vindicator having a break in his usual demeanor, despite me being cooperative.
-
It is a FACT that the same IP address attempted to do basic injections. This means typing strings into the browser bar to see what my site generates. Some came FROM Voat, FROM the thread Vindicator was mad about within minutes of him being mad. This attack came from IP XXXXXXXXX.
[Insert Log Here]
This type of attack is very low level. But, the log shows what they were entering and their IP, XXXXXXXXX. [Insert Screenshot Here]
They then tried to download my whole site from the same IP XXXXXXXXX.
[Insert Log Here]
It is important to note my site has never been attacked and it basically has no visitors. I just use it as my own automated news reel to make sure I don't miss anything.
- Immediately after these low level attacks, malicious scripts started coming from another IP address. YYYYYYYY
This is where it got interesting. The computer was coming from within an internal network at CACI and HAD THE COMPUTER NAME, which was a person's name. [Insert Screenshot Here]
I immediately searched through the Anti Public collection (which anyone can download using a torrent client) for the name and found [Insert Screenshot Here]
Notice the password is "goatblower." Is this a reference to being a Voat shill, "blowing away the goats?"
So, we now have a CACI internal network, at a CACI location, with a computer who has a name that matches with a QinetiQ email address. [Insert Screen Shot]
The attacks started becoming even more sophisticated and from more places and from cloud services with IPs like ZZZZZZZZZ. Basically, impossible to track. So, with help...
- [Skip Step for now might not be necessary]
Notice the connection between QinetiQ and CACI. [Insert Image Here]
Notice that they have had a plan all along to use "social networking to organize protests" [Insert Link and screenshot here]
Notice that we have another hacker group from California with a leader who called themselves "Q" and these groups are all connected by George Tenet.
[Insert Screenshot here]
- Vindicator, at one point, found an "IamQ" user who posted a couple of years ago, but the post was ignored. Well, that's weird, because of this email account and password and this email account and password [insert screenshots IamQ here] [Insert Vindicators emails screenshot here]
The odds of this all matching up are more than astronomical.
My only problem is that I've been politely poking and prodding at Vindicator and he just doesn't seem that smart. He indicated that if VOAT ATTACKED YOUR SITE THEN BLABLAHBLAH. Of course VOAT DID NOT ATTACK MY SITE. None of that is in my explanation. Someone who CAME FROM VOAT attacked my site. I hope that is crystal clear. If Vindicator suggest that I am suggesting Voat attacked anyone, he is not being super honest or he is intentionally playing dumb to make it seem like I am accusing putt, and not him, specifically. He is also spreading fear that I am out to dox people. I am not. I am asking for advice on how to present this. Since no one answered... this is my proposal.
Fair?
At this stage, since I dont think that I've got an answer... Vindicator; "Did you, or did you not enter those strings into your browser bar? If not, do you know who did?"
Edit: So, right now, only two people are responding without insults and about 5 are only insulting. Like I said, I don't have time today, and I was hoping to reach a consensus so I could fill in the blanks right now, but I don't really have that, yet.
I intend to present this in a way anyone can check for themselves, just like I do with all my other research. Anyone who has been watching me knows this. If you need more of what I gathered to make a determination, sort /v/thewebofslime by new. I will be back and I hope someone who can go without insults will weigh in. Thanks. - WoS
Edit 2: I was not able to get on Voat, last night and today is sporadic. I was able to have this conversation on other platforms without a lot of the outrage that I received here, which was helpful and I have a lot of new information. The blanks in this post are filled in throughout my other Internet haunts, so this information is out there.
I will take time to put this together in a thoughtful manner and I am not going to be working on it, today. Suffice it to say, that it is a lot easier to talk to people about this who have the technical knowledge to ask the right questions and who can check the Collection #1 database, themselves, to compare with available social media.
What I have are two parallel sets of facts that seemingly had nothing to do with each other until a CACI company device was thrown into the mix. See you all soon. Drink plenty of water.
SearchVoatBot ago
This submission was linked from this v/ProtectVoat comment by @think-.
Posted automatically (#44472) by the SearchVoat.co Cross-Link Bot. You can suppress these notifications by appending a forward-slash(/) to your Voat link. More information here.
SearchVoatBot ago
This submission was linked from this v/MeanwhileOnReddit comment by @MrPim.
Posted automatically (#31664) by the SearchVoat.co Cross-Link Bot. You can suppress these notifications by appending a forward-slash(/) to your Voat link. More information here.
SearchVoatBot ago
This submission was linked from this v/MeanwhileOnReddit submission by @SandHog.
Posted automatically (#31663) by the SearchVoat.co Cross-Link Bot. You can suppress these notifications by appending a forward-slash(/) to your Voat link. More information here.
SandHog ago
Have you considered the possibility that it was simply some random person whose computer has been infected and is part of a botnet? Honestly, that seems far more likely to me than any of what you have presented in all of this.
thewebofslime ago
When I fill in the blanks, all will be made clear.
However, I need at least one person to acknowledge that this is an acceptable way to present evidence. I intend to present it so that anyone can check for themselves.
You can double check these are real, for yourself, in the haveibeenpwned database or by downloading the torrent and searching it, yourself on your own computer. You do not have to take my word for it.
[email protected] 34db7ed52753394de58d0f72a8c49bd7
[email protected] curtis999
[email protected] geujVdbWf
[email protected] angel1
[email protected] pk3x7w9W
Wazhappenin1 ago
Do it. And let the Chios fall where they may. If you have proof of an insurgent attack put it out there. I know absolutely nothing about what younarebtalikng about, I have no computer knowledge whatsoever. I can not even upload a picture file to cat box . However . I'm curious to see and to know who is trying to pry open your clam shell.
If only to better understand Voat. If the hacker was up to no good or if he was just nosing around because he could.
Point being it doesn't matter a hill of beans if you WOS are an asshole or polite. Your information and ways of dispersing it , your knowledge of the players in what will become history's greatest crimes against humanity is enough for me to give you the BOTD.
Put it out there. Let all of us make our decisions whether Voat is a gov operation. Whether from Tel Aviv or Langley .
SandHog ago
Or you could, you know, just answer my question instead of copy/pasting a reply.
thewebofslime ago
The intitial attacks 100% did not come from a botnet.
A botnet steals someone else's computer to run the attacks. This would be easy to trace and would have constituted more attacks that wouldn't have stopped after I made an accusation. A botnet would still be working my site.
kneo24 ago
Just because you state something as a fact doesn't make it true. I have yet to see any substantiation of him being "mad" about your "thread". Are you claiming he's "mad" because you broke the subverse rules? I just don't understand where you're getting this "he mad, he mad" thing from.
I don't believe that for a second. For starters, you freely advertise your website all over. You spam posts here on Voat, I've seen it on notabug.io, and if my memory serves me correctly, you've complained it about it being banned from Reddit. It's even linked in your user profile. That's not the mark of someone using it as an automated news reel.
There's been nothing polite about what you've been doing. You outright made an accusation, that more or less, vindicator, has been attacking your website. You did this days ago. You continued on with it. For someone who is just "trying to get to the truth", you sure as shit start a lot of dumb drama over purposely making yourself noticed, to only further propagate making yourself further noticed. Not that I expect any sort of honest answer here, but what is your intent with this?
Your actions are questionable, and you more or less state yourself you've been connecting usernames across social media platforms and digging into people. It's not an unfounded accusation like you pretend it is even if that ends up not being your intent.
It's a dumb question to ask. If you get "no's" to these, which I imagine you will, you're going to call them a liar anyway and post more long winded bullshit and never actually make the link between vindicator and what you saw.
It's all bullshit though. I've seen you claim a few times now, "I don't have much time for this right now", so you create shells of posts to later go back and edit them, or find time to continue on regardless in the comments sections. If you didn't have time for this right now, you'd wait till you did. How hard would it be to create a rough draft in a notepad file?
1.5 days ago when I told you:
You've done absolutely zero to change my mind.
thewebofslime ago
https://voat.co/v/GreatAwakening/3130351
I am going to present facts in a manner that you can check for yourself, where you do not have to take my word for it.
I am trying to get an understanding of the best way to do that, but I find it curious that 5 people are really upset about this and most others are being encouraging.
Either way... I'm not going to ask you to take my word for anything.
You can double check these are real, for yourself, in the haveibeenpwned database or by downloading the torrent and searching it, yourself on your own computer. You do not have to take my word for it.
[email protected] 34db7ed52753394de58d0f72a8c49bd7
[email protected] curtis999
[email protected] geujVdbWf
[email protected] angel1
[email protected] pk3x7w9W
Tell me if you have an understanding on how to check the validity of these emails, yourself, per my instructions.
kneo24 ago
Again, for someone who claims to not have a lot of time right now, you sure are investing it in carrying on multiple threads. Notice how you didn't respond to a single thing I wrote? I know I did.
thewebofslime ago
I don't have a lot of time.
I am asking if this is an appropriate way to share evidence.
I will fill in the blanks in a manner in which everyone can confirm for themselves.
My question to you is, is this format sufficient for proof? and are you able to confirm email addresses and passwords in the leaked collection?
I'm politely trying to help other people understand who don't have technical knowledge.
You are attacking evidence that hasn't been presented, yet. I find that strange. Just stick to what I am trying to accomplish... unless what I am presenting scares you.
kneo24 ago
Once again, you're not actually addressing anything I wrote.
I don't buy this, "I don't have a lot of time". You keep using said time you don't have not actually addressing anything.
derram ago
https://files.catbox.moe/gf0dlw.png :
This has been an automated message.