One extremely important weakness in this argument:



Here's a real yfrog email address:



Now, if you have that zyxor bit, it would seem to be relatively trivial to post a picture to Tom's account. But the question is how somebody would know that. As you can see when you click the pix that Tom posted, it does not show up. If you go to the link that came from his twitter feed, you see the first part of the email address but not those five letters that come afterwards. I assume you got unabogie's email address at yfrog privately, but you can see the problem there; presumably Congressman Weiner was not giving out his yfrog email address. Getting those five characters could be pretty tough; if we assume they are only letters, there are about 11 million combinations. So it looks like we are back to those nefarious haxxors.

Yes, Unabogie and I shared that email address.

Or he himself had already posted it. Someone more skilled in internet searches than I could check and see if it was posted somewhere.
 
Yes, Unabogie and I shared that email address.

Or he himself had already posted it. Someone more skilled in internet searches than I could check and see if it was posted somewhere.

Just to clarify...where did I share that?

ETA: nevermind. Yes I shared that.
 
Last edited:
There are ways of getting this information that don't actually involve hacking. Remember that whole Sarah Palin hacked e-mail thing? It didn't involve any hacking.
That was done by password cracking and that does come under the techniques known broadly as hacking.
 
Hacking is very different than a virus. Wiener continues to maintain that his account was hacked: "I know for a fact that my account was hacked". Hacking incidents most certainly should be reported to the police.

Haha. Do you not remember how this exchange started? You argued that there could be an ongoing security risk from Weiner, therefore he HAD TO CALL THE AUTHORITIES IMMEDIATELY:

Shear nonsense. If his account was hacked as he claims, there could be a key logger on his computer, extracting confidential official business information. If it was an internal prank, someone unauthorized in is staff or close to his staff could have access to much more than just his Twitter account. In short there could be many security breaches way beyond his Twitter account that deserves immediate reporting and investigating by the police.

Again, all of those things could be handled by 1) going to an IT person to check for viruses, and 2) changing all of the passwords.

I know the right can't help turning ever issue into an episode of 24, but holy crap, this is pathetic even by your already low standards.

He has repeatedly said he would not allow the incident to distract him from his job, yet if he would have contacted the FBI initially, and if he was hacked, all this would be behind him. Instead he lawyers up and won't give straight answers in his interviews. Now if he was hacked it might make sense to get a lawyer to get a lawsuit going against the person, but first you have to have the evidence, which is why you contact the police first.

Oh god. Really? You think going to the FBI would have made Breitbart leave this alone?

Just like Breitbart apologized for the maliciously edited ACORN and Planned Parenthood videos when it turned out the employees shown called the police after the "sting" interviews.

Please, right wing hysteria does not end when events are brought to a rational conclusion. They were spending millions of dollars investigating Whitewater 20 years after everyone learned that it was a non-issue.

This fantasy world you've constructed is amusing.
 
That was done by password cracking and that does come under the techniques known broadly as hacking.

"As detailed in the postings, the Palin hack didn’t require any real skill. Instead, the hacker simply reset Palin’s password using her birthdate, ZIP code and information about where she met her spouse — the security question on her Yahoo account, which was answered (Wasilla High) by a simple Google search."

I missed the part about password cracking ? I guess using google can be considered hacking in some circles ...
 
An official investigation would clear all this up. A law enforcement agency could subpoena Twitter or Yfrog for the IP address from which the photo and tweet were posted. If that IP address pointed to a machine other than Weiner's, case closed.

Or law enforcement could continue not wasting time or resources on this trivial matter while focusing on their actual jobs.
 
That was done by password cracking...

No, it wasn't. Read up on it.

My point is that the Palin incident could have been pulled off by someone with almost no computer knowledge whatsoever. All you needed for that was basic familiarity with Yahoo e-mail and the ability to use Google.
 
Or law enforcement could continue not wasting time or resources on this trivial matter while focusing on their actual jobs.

Do you really buy that bizarre excuse?

If somebody tried to destroy my reputation, I would not think it a waste of time for law enforcement to investigate the matter.

Last time I checked, hacking into somebody's account is a real crime and law enforcement's actual job is to enforce the law.

I rather have them do that than look for pot smokers to bust.

I would love for Breitbart to be publicly bitchslapped over this. Instead, Weiner is even making liberal media suspicious.

Momentum shifts in Weiner crotch shot story

What's certain right now is that Weiner, through his odd behavior over the last 24 hours, has succeeded in convincing much of the press that there's at least a possibility he was responsible for sending the lewd image to a college student in Washington state.

The shift in the seriousness with which the press is treating the story can be chalked up above all to Weiner's painfully awkward press conference yesterday. For a full seven minutes, he repeatedly told reporters he was done commenting on the Twitter story, while unsuccessfully trying to change the subject to Clarence Thomas.

But reporters predictably found it odd that Weiner -- whose office has said he was the victim of a hack -- refused to answer several basic questions, including, was that him in the photo?

I understand that Breitbart is out to get Weiner, but I don't think you can say that about Salon or Slate or Talking Points Memo.
 
Hoo, boy, somebody should tell this idjit to shut up.
Rep. Weiner replied, “I have to say, I wish!” before saying that “the photo doesn’t look familiar to me.” Yet he still refused to say definitively whether it is him, but this time explained his rationale slightly more: “stuff gets manipulated… maybe it started out being a photograph of mine,” he allowed, that “was taken out of context.”
He's apparently never heard of the first rule of holes.
 
And the Weiner could sack the lawyer he hired to explore civil and criminal charges.
And let compost boy Breitbart go about his merry way making life hell for his betters? You're kidding, right?

If you are a public figure with important stuff to do, you hire a laywer to deal with pipsqueaks like Breitbart and stick to doing the business of the nation. You don't give blowflies like that the pleasure of seeing you stray off-task.
 
"As detailed in the postings, the Palin hack didn’t require any real skill. Instead, the hacker simply reset Palin’s password using her birthdate, ZIP code and information about where she met her spouse — the security question on her Yahoo account, which was answered (Wasilla High) by a simple Google search."

I missed the part about password cracking ? I guess using google can be considered hacking in some circles ...

That is technically hacking her account, even if a keygen was not used. That is 'hacking' her email account.
 
I swear, Hollywood has given people the idea that "hacking" means sitting in front of a login screen, typing really fast, and by the time Halle Berry's done giving you a BJ you have full access to everything under the sun.
 
I'm sure the forum members that were whipped into a fervor over Weiner will pursue this story with equal zeal:

Aides to the Republican speaker of the Ohio House say his Twitter account was hacked by a person who tweeted support for liberal causes.
http://www.huffingtonpost.com/huff-wires/20110602/us-ohio-speaker-twitter-hacked/

He must be lying. Twitter is impossible to "hack," or whatever. Why isn't the FBI involved, is the speaker really a liberal? These are questions that must be answered now. The future of the nation is at risk.

And this:

"This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists," wrote Eric Grosse, Google's security team engineering director in a mid-afternoon blog post.
http://idealab.talkingpointsmemo.co...ve-been-hijacked-again-in-china.php?ref=fpblg

This sort of thing is fairly common in the modern world, but including a penis seems to make it more interesting, especially for the right wingers. Perhaps Krugman should just put pictures of his dong in his columns. That would greatly increase the chance that members of the right would learn something about economics and not be so giddy about vapid dolts like Paul Ryan.
 
Last edited:

Back
Top Bottom