home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.privacy      Discussing privacy, laws, tinfoil hats      112,125 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 111,961 of 112,125   
   D to Keith   
   Re: dox everyone   
   27 Dec 25 21:45:51   
   
   From: J@M   
      
   On Sat, 27 Dec 2025 18:42:16 GMT, Keith    
   wrote:   
   >Path: news..!usenet.network!eternal-september.org!feeder.eternal-september.org   
   >             !nntp.eternal-september.org!newsgrouper.org!.POSTED!not-for-mail   
   >Message-ID: <1766860936-13263@newsgrouper.org>   
   >Injection-Info: newsgrouper.org;   
   >User-Agent: Newsgrouper/0.8.3   
      
   headers look correct (not eelbash, not x-posted) . . .   
      
   >im kind of a psychotic evil nigger but any time someone involved in politics   
   or   
   >technology proposes something that would curtail civil liberties in the name   
   of   
   >"child safety" or some other horse shit lets just dox them and their family,   
   so   
   >that they understand why what they're proposing is a terrible idea. im sure   
   there   
   >are people on hacking forums already working on this but I just wanted to   
   provide   
   >some additional encouragement.   
   >if they "go dark" and begin taking measures to anonymize the identities of   
   those   
   >involved then we can penetrate their organization, people who do not   
   understand   
   >technology yet choose to make policy proposals regarding it anyway tend not to   
   >have very good OPSEC.   
      
   (using Tor Browser 15.0.3)   
   https://duckduckgo.com/?q=opsec+acronym&ia=web&assist=true   
   >OPSEC stands for "Operations Security." It is a process used to protect   
   sensitive   
   >information from being accessed by adversaries. Proofpoint Wikipedia   
   >Meaning of OPSEC   
   >OPSEC stands for "Operations Security."   
   >Purpose of OPSEC   
   >The primary goal of OPSEC is to protect sensitive information from   
   adversaries.   
   >It involves identifying critical information, analyzing potential threats, and   
   >implementing measures to prevent unauthorized access.   
   >Key Components of OPSEC   
   >Five-Step Process   
   >  Identify Critical Information: Determine what information needs protection.   
   >  Analyze Threats: Assess who might want to exploit this information.   
   >  Analyze Vulnerabilities: Identify weaknesses that could be exploited.   
   >  Assess Risks: Evaluate the potential impact of threats on operations.   
   >  Apply Countermeasures: Implement strategies to mitigate risks.   
   >Applications   
   >  Military: Originally developed during the Vietnam War to protect military   
   >  operations.   
   >  Private Sector: Used to safeguard against competitive intelligence and cyber   
   >  threats.   
   >OPSEC is essential for maintaining security in both military and civilian   
   >contexts, ensuring that sensitive information remains protected from potential   
   >exploitation.   
   >U.S. Army Proofpoint   
   [end quoted "search assist"]   
      
   so that explains it . . . "operations security" did not exist until   
   after rock and roll music was invented . . . a communist conspiracy   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca