Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
13 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Poor Fox "News" Pimp (Original Post) brokephibroke Feb 2018 OP
Fucking CSPAN Book TV is having him on touting some so called book he has out! Gabi Hayes Feb 2018 #1
Dear James lapfog_1 Feb 2018 #2
Not if it is proxied through any of many compromised US machines jberryhill Feb 2018 #7
sure lapfog_1 Feb 2018 #8
The Russians are certainly that sophisticated jberryhill Feb 2018 #9
Actually I was thinking of that exact scenario and almost included it lapfog_1 Feb 2018 #11
Or Snapchat or etc., etc. jberryhill Feb 2018 #12
so I've been kicking around an idea lapfog_1 Feb 2018 #13
James O'Queef Can Suck A Dick,,With Piss In It... Grassy Knoll Feb 2018 #3
Go fuck a bag of broken glass! Glamrock Feb 2018 #10
Convict says what? nt stevenleser Feb 2018 #4
My reply to him on Twitter... stevenleser Feb 2018 #5
Reading that tweeter feed is hilarious drray23 Feb 2018 #6

lapfog_1

(29,205 posts)
2. Dear James
Thu Feb 22, 2018, 01:05 AM
Feb 2018

I know a bit about the internet... having worked various bits of it since 1976.

There are ways of detecting the origin of any message... even it the original sender goes to some lengths to hide the origin.

We started way back when with tools like traceroute and ping and ttcp ( written by my friend Terry Slattery at the US Naval Academy )

There are many more sophisticated tools since then to trace packets even through a TOR router. But never mind that... all twitter needed to do was to trace your fake followers back to either a non-US origin or a TOR router ( internet black hole ) and make a simple determination that your follower is NOT who they claimed to be... and is likely a bot or foreign troll.

Bye bye fake followers. As for you. dear James. turns out not that many people (real ones) are into you.

 

jberryhill

(62,444 posts)
7. Not if it is proxied through any of many compromised US machines
Thu Feb 22, 2018, 02:12 AM
Feb 2018

Not all malware is about scams, and granny tea partier is running Windows XP that wasn’t patched even when it was supported.

Oh, those cheap Russian developers that wrote the point of sale software used by the IT consultant who set up the bakery down the street... it has some undocumented features.

Cmon. People’s machines are highjacked to run crypto mining. A remote twitter server is pretty damned simple.

lapfog_1

(29,205 posts)
8. sure
Thu Feb 22, 2018, 02:19 AM
Feb 2018

if the only message ever sent by the malware was preprogrammed into the hijacked computer.

However, if you wanted to command it to do something more real time... you have to send the hijacked machine a message... even if encrypted, that message would have originated someplace. relate the events and bingo, you have a different origin.

However, I suspect that twitter isn't that sophisticated yet, nor has access to the tools to do that sort of tracing... and, fortunately for us, neither are the russian bot farms.

 

jberryhill

(62,444 posts)
9. The Russians are certainly that sophisticated
Thu Feb 22, 2018, 02:28 AM
Feb 2018

To command the installed bot, all it has to do is read steganographic messages in YouTube videos of cats, or Facebook posts of cute animated gifs. The possibilities are endless and would look like ordinary traffic on Granny tea party’s machine, or a server at the NRA.

Yeah, you might think someone would notice a shitload of data being piped out of Sony Pictures to North Korea too, but...

lapfog_1

(29,205 posts)
11. Actually I was thinking of that exact scenario and almost included it
Thu Feb 22, 2018, 02:43 AM
Feb 2018

stenography being my specialty.

And yes, I would infect the target with a once a day "picture fetch" ( at times that are not suspicious ) and have it fetch a .jpg from a benign source of an image that appears no place else ( must be original content ) and have your encrypted message in the last 3 bits of every pixel ( or even 1 bit of each color in the pixel ) That would be almost untraceable. Almost. Then all the bot farmers have to do is embed the "twitter follow" or "retweet" command in a sufficiently large enough photo and bingo, you have effectively hidden a bot on the US sourced machine with likely a stolen identity.

Again, from all that I've read, the St. Petersberg operation was not anywhere near that sophisticated.

To detect this sort of operation one would likely construct an AI and train it with a few billion simulated hacks of this nature and then turn it loose on all twitter traffic. I'm betting that this is good enough to detect the Russian bot farmers ( at least for now )

 

jberryhill

(62,444 posts)
12. Or Snapchat or etc., etc.
Thu Feb 22, 2018, 03:01 AM
Feb 2018

How about that nice cheap security camera you bought online or that really cool Wi-Fi connected widget. I got this great Wi-Fi enabled action cam I use for cycling for only 89 bucks!
I have no illusions that it doesn’t phone home to China.

There is so much traffic, you can do a “spread spectrum” type of approach, such that the encoded message, and no intelligible part of it, is contained within a single channel.

I remember when we thought it was amazing that Dave Farber had a WHOLE T1 line to his house when some entire engineering departments would have to share that kind of capacity

But you don’t have to use compromised systems anyway, if you have confederates operating systems for you here in the US. The haystack is huge.

lapfog_1

(29,205 posts)
13. so I've been kicking around an idea
Thu Feb 22, 2018, 03:10 AM
Feb 2018

to use blockchain encryption methods to establish a verified online identity for every legitimate user. One which is established for you at a bank or other institution by means of biometric identification. Once established, your various internet connected devices would verify your authority to command things in "your name" by solving the blockchain encryption and comparing results with the rest of the internet (similar to what crypto-currencies do now.

Haven't worked it all out yet.

BTW, my group put in the first backbone T1 from MAE-West to MAE-East (NASA Ames to NASA Goddard) way back in the day.

 

stevenleser

(32,886 posts)
5. My reply to him on Twitter...
Thu Feb 22, 2018, 01:20 AM
Feb 2018



Steven Leser
?

@stevenleser
4m4 minutes ago
More
Replying to @JamesOKeefeIII
Didn't you plead guilty to several crimes and don't you deliberately produce misleading videos? And now you are playing at being self-righteous? #hypocrite #liar #fraud

drray23

(7,633 posts)
6. Reading that tweeter feed is hilarious
Thu Feb 22, 2018, 01:24 AM
Feb 2018

Dozens of redneck nobodies who are outraged they lost thousands of followers. It does not occur to them that they did not acquire them in the first place by being eloquent, bright or a known public figure. They did because they re tweeted and followed bots, which in turn did the same and it snowballed to them having thousand of not followers carrying Russia's propaganda...

Latest Discussions»General Discussion»Poor Fox "News" Pimp