leftysergeant
Penultimate Amazing
- Joined
- Jul 13, 2007
- Messages
- 18,863
If yfrog is also linkable to message boards, yes, it would be available.
So it looks like we are back to those nefarious haxxors.
An official investigation would clear all this up. A law enforcement agency could subpoena Twitter or Yfrog for the IP address from which the photo and tweet were posted. If that IP address pointed to a machine other than Weiner's, case closed. Or, if Weiner would rather avoid the hassle, he could always just drop trou.
One extremely important weakness in this argument:
Here's a real yfrog email address:
Now, if you have that zyxor bit, it would seem to be relatively trivial to post a picture to Tom's account. But the question is how somebody would know that. As you can see when you click the pix that Tom posted, it does not show up. If you go to the link that came from his twitter feed, you see the first part of the email address but not those five letters that come afterwards. I assume you got unabogie's email address at yfrog privately, but you can see the problem there; presumably Congressman Weiner was not giving out his yfrog email address. Getting those five characters could be pretty tough; if we assume they are only letters, there are about 11 million combinations. So it looks like we are back to those nefarious haxxors.
Yes, Unabogie and I shared that email address.
Or he himself had already posted it. Someone more skilled in internet searches than I could check and see if it was posted somewhere.
That was done by password cracking and that does come under the techniques known broadly as hacking.There are ways of getting this information that don't actually involve hacking. Remember that whole Sarah Palin hacked e-mail thing? It didn't involve any hacking.
Hacking is very different than a virus. Wiener continues to maintain that his account was hacked: "I know for a fact that my account was hacked". Hacking incidents most certainly should be reported to the police.
Shear nonsense. If his account was hacked as he claims, there could be a key logger on his computer, extracting confidential official business information. If it was an internal prank, someone unauthorized in is staff or close to his staff could have access to much more than just his Twitter account. In short there could be many security breaches way beyond his Twitter account that deserves immediate reporting and investigating by the police.
He has repeatedly said he would not allow the incident to distract him from his job, yet if he would have contacted the FBI initially, and if he was hacked, all this would be behind him. Instead he lawyers up and won't give straight answers in his interviews. Now if he was hacked it might make sense to get a lawyer to get a lawsuit going against the person, but first you have to have the evidence, which is why you contact the police first.
That was done by password cracking and that does come under the techniques known broadly as hacking.
An official investigation would clear all this up. A law enforcement agency could subpoena Twitter or Yfrog for the IP address from which the photo and tweet were posted. If that IP address pointed to a machine other than Weiner's, case closed.
Or law enforcement could continue not wasting time or resources on this trivial matter while focusing on their actual jobs.
That was done by password cracking...
Or law enforcement could continue not wasting time or resources on this trivial matter while focusing on their actual jobs.
What's certain right now is that Weiner, through his odd behavior over the last 24 hours, has succeeded in convincing much of the press that there's at least a possibility he was responsible for sending the lewd image to a college student in Washington state.
The shift in the seriousness with which the press is treating the story can be chalked up above all to Weiner's painfully awkward press conference yesterday. For a full seven minutes, he repeatedly told reporters he was done commenting on the Twitter story, while unsuccessfully trying to change the subject to Clarence Thomas.
But reporters predictably found it odd that Weiner -- whose office has said he was the victim of a hack -- refused to answer several basic questions, including, was that him in the photo?
He's apparently never heard of the first rule of holes.Rep. Weiner replied, “I have to say, I wish!” before saying that “the photo doesn’t look familiar to me.” Yet he still refused to say definitively whether it is him, but this time explained his rationale slightly more: “stuff gets manipulated… maybe it started out being a photograph of mine,” he allowed, that “was taken out of context.”
Do we even know if any of Weiner's staff has access to his twitter account?
And let compost boy Breitbart go about his merry way making life hell for his betters? You're kidding, right?And the Weiner could sack the lawyer he hired to explore civil and criminal charges.
"As detailed in the postings, the Palin hack didn’t require any real skill. Instead, the hacker simply reset Palin’s password using her birthdate, ZIP code and information about where she met her spouse — the security question on her Yahoo account, which was answered (Wasilla High) by a simple Google search."
I missed the part about password cracking ? I guess using google can be considered hacking in some circles ...
http://www.huffingtonpost.com/huff-wires/20110602/us-ohio-speaker-twitter-hacked/Aides to the Republican speaker of the Ohio House say his Twitter account was hacked by a person who tweeted support for liberal causes.
http://idealab.talkingpointsmemo.co...ve-been-hijacked-again-in-china.php?ref=fpblg"This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists," wrote Eric Grosse, Google's security team engineering director in a mid-afternoon blog post.
That is technically hacking her account, even if a keygen was not used. That is 'hacking' her email account.