Rough Draft:
I don't want to spend all day on this, so I'm doing a rough draft tonight so people can look it over. I've got family around, articles to write that have nothing to do with Web of Slime and a podcast to prepare for, tomorrow. I don't want to dox anyone. I have not threatened to dox anyone. I just want the best way to present evidence, but everyone is too busy being insulting. Here is my rough draft and if everyone thinks it's okay for me to fill in these blanks, I can do that. Just know... it IS a bit of doxxing. If you have suggestions on how to edit images appropriately what to leave in, what to leave out... etc. I'm all ears. If you know someone who knows about web security... might be a good person to have look at this.
I am ready to present proof in a reasonable manner, but I would like some input first.
Also, I finally had some movement on the Flaherty thing and I REALLY want to start with that. That is going to be way more fun for me.
Keep in mind, this is the first time I've ever made a website. I don't really know much about it and you can see my site.google.com where I started. I've never had to deal with this, I've only heard about it. I've come a long way in three years, but I am going to use someone who knows more to help explain this.
- Google Analytics, who watches everyone, sees a visitor go from the Pizzagate thread TO my site. In fact, it was more traffic than my site had ever seen. You can see where everyone is coming from:
https://i.imgur.com/N3rto6v.png
So, factually, Google allows me to see that someone came from my thread to my site. It is a FACT that someone with XXXXXXXX IP address went from my thread on Voat TO my site.
-
It is a FACT that this was within minutes of Vindicator having a break in his usual demeanor, despite me being cooperative.
-
It is a FACT that the same IP address attempted to do basic injections. This means typing strings into the browser bar to see what my site generates. Some came FROM Voat, FROM the thread Vindicator was mad about within minutes of him being mad. This attack came from IP XXXXXXXXX.
[Insert Log Here]
This type of attack is very low level. But, the log shows what they were entering and their IP, XXXXXXXXX. [Insert Screenshot Here]
They then tried to download my whole site from the same IP XXXXXXXXX.
[Insert Log Here]
It is important to note my site has never been attacked and it basically has no visitors. I just use it as my own automated news reel to make sure I don't miss anything.
- Immediately after these low level attacks, malicious scripts started coming from another IP address. YYYYYYYY
This is where it got interesting. The computer was coming from within an internal network at CACI and HAD THE COMPUTER NAME, which was a person's name. [Insert Screenshot Here]
I immediately searched through the Anti Public collection (which anyone can download using a torrent client) for the name and found [Insert Screenshot Here]
Notice the password is "goatblower." Is this a reference to being a Voat shill, "blowing away the goats?"
So, we now have a CACI internal network, at a CACI location, with a computer who has a name that matches with a QinetiQ email address. [Insert Screen Shot]
The attacks started becoming even more sophisticated and from more places and from cloud services with IPs like ZZZZZZZZZ. Basically, impossible to track. So, with help...
- [Skip Step for now might not be necessary]
Notice the connection between QinetiQ and CACI. [Insert Image Here]
Notice that they have had a plan all along to use "social networking to organize protests" [Insert Link and screenshot here]
Notice that we have another hacker group from California with a leader who called themselves "Q" and these groups are all connected by George Tenet.
[Insert Screenshot here]
- Vindicator, at one point, found an "IamQ" user who posted a couple of years ago, but the post was ignored. Well, that's weird, because of this email account and password and this email account and password [insert screenshots IamQ here] [Insert Vindicators emails screenshot here]
The odds of this all matching up are more than astronomical.
My only problem is that I've been politely poking and prodding at Vindicator and he just doesn't seem that smart. He indicated that if VOAT ATTACKED YOUR SITE THEN BLABLAHBLAH. Of course VOAT DID NOT ATTACK MY SITE. None of that is in my explanation. Someone who CAME FROM VOAT attacked my site. I hope that is crystal clear. If Vindicator suggest that I am suggesting Voat attacked anyone, he is not being super honest or he is intentionally playing dumb to make it seem like I am accusing putt, and not him, specifically. He is also spreading fear that I am out to dox people. I am not. I am asking for advice on how to present this. Since no one answered... this is my proposal.
Fair?
At this stage, since I dont think that I've got an answer... Vindicator; "Did you, or did you not enter those strings into your browser bar? If not, do you know who did?"
Edit: So, right now, only two people are responding without insults and about 5 are only insulting. Like I said, I don't have time today, and I was hoping to reach a consensus so I could fill in the blanks right now, but I don't really have that, yet.
I intend to present this in a way anyone can check for themselves, just like I do with all my other research. Anyone who has been watching me knows this. If you need more of what I gathered to make a determination, sort /v/thewebofslime by new. I will be back and I hope someone who can go without insults will weigh in. Thanks. - WoS
Edit 2: I was not able to get on Voat, last night and today is sporadic. I was able to have this conversation on other platforms without a lot of the outrage that I received here, which was helpful and I have a lot of new information. The blanks in this post are filled in throughout my other Internet haunts, so this information is out there.
I will take time to put this together in a thoughtful manner and I am not going to be working on it, today. Suffice it to say, that it is a lot easier to talk to people about this who have the technical knowledge to ask the right questions and who can check the Collection #1 database, themselves, to compare with available social media.
What I have are two parallel sets of facts that seemingly had nothing to do with each other until a CACI company device was thrown into the mix. See you all soon. Drink plenty of water.
view the rest of the comments →
SandHog ago
Have you considered the possibility that it was simply some random person whose computer has been infected and is part of a botnet? Honestly, that seems far more likely to me than any of what you have presented in all of this.
thewebofslime ago
When I fill in the blanks, all will be made clear.
However, I need at least one person to acknowledge that this is an acceptable way to present evidence. I intend to present it so that anyone can check for themselves.
You can double check these are real, for yourself, in the haveibeenpwned database or by downloading the torrent and searching it, yourself on your own computer. You do not have to take my word for it.
[email protected] 34db7ed52753394de58d0f72a8c49bd7
[email protected] curtis999
[email protected] geujVdbWf
[email protected] angel1
[email protected] pk3x7w9W
Wazhappenin1 ago
Do it. And let the Chios fall where they may. If you have proof of an insurgent attack put it out there. I know absolutely nothing about what younarebtalikng about, I have no computer knowledge whatsoever. I can not even upload a picture file to cat box . However . I'm curious to see and to know who is trying to pry open your clam shell.
If only to better understand Voat. If the hacker was up to no good or if he was just nosing around because he could.
Point being it doesn't matter a hill of beans if you WOS are an asshole or polite. Your information and ways of dispersing it , your knowledge of the players in what will become history's greatest crimes against humanity is enough for me to give you the BOTD.
Put it out there. Let all of us make our decisions whether Voat is a gov operation. Whether from Tel Aviv or Langley .