Twitter Hack Details Revealed 222
Jack Spine writes "Twitter co-founder Biz Stone has confirmed both to ZDNet UK and Wired's Threat Level blog that a dictionary attack was used to hack Twitter. After the hacker distributed details on the Digital Gangster forum, celebrities such as Britney Spears and Barack Obama had their accounts defaced.
Wired spoke to the alleged hacker, while ZDNet UK got in contact with someone who had been on the Digital Gangster forum at the time."
Lack of Hacker Ethics (Score:5, Insightful)
Cracking the site was easy, because Twitter allowed an unlimited number of rapid-fire log-in attempts.
Twitter is doubly at fault here. First, it's not that hard to detect rapid-fire password attacks. Even Unix (way before Linux) knew to kick you out after 3 failed attempts. Second, they should enforce better passwords for their employees (not necessarily for regular users, that's another discussion).
He decided not to use other hacked accounts personally. Instead he posted a message to Digital Gangster offering access to any Twitter account by request.
That's where the 18-year old kid is at fault. He showed a lack of hacker ethics. Good hackers may discover an exploit, but they don't do harm.
When I hacked my university's computer network (Vax machines on Bitnet back in 1990), I did it with the knowledge of the sysadmin staff. And once you have made your point, you stand back.
--
FairSoftware.net [fairsoftware.net] -- geeks starting fair and open software businesses together
Re:Lack of Hacker Ethics (Score:5, Funny)
That's where the 18-year old kid is at fault. He showed a lack of hacker ethics. Good hackers may discover an exploit, but they don't do harm.
Maybe so, but really nice hackers patch the exploit with fairy dust and unicorn farts.
Re:Lack of Hacker Ethics (Score:5, Funny)
Yeah, Hacker Ethics, that's it.
That reminds me of the time I thought I heard a noise at night and I walked into my kids room and there was this guy standing there looking at my 8 month old daughter sleeping. Scared the shit out of me. I was about to either kick his ass, or shit myself when he told me to calm down. He was an Ethical Burglar(TM).
He had used some pretty basic lock picking methods to break in and just wanted me to know my family was at risk and that we should cage ourselves in our own home so that the marauding Visigoths couldn't break in and kill us all.
I thanked him for his generous service and he said it was no problem. On his way out he looked at my house one more time and mentioned that he might come back another time and set the place on fire, so we should probably get a coating of asbestos or something to be ready for that.
I only wish we had more of these ethical hackers and burglers to keep up safe.
Re: (Score:3, Funny)
First of all, it was the (grand)parent comment that coined the term "Hacker Ethics."
Secondly, the problem with your argument is in actual usage. People that engage in cracking call themselves hackers because calling yourself a cracker implies you married your sister and spend most of your time playing banjo on the porch.
Re:Lack of Hacker Ethics (Score:4, Insightful)
That was terribly funny, but also terribly stupid.
I must say you're awfully good looking, but you smell horrible.
The analogy simply doesn't hold. You know quite well how secure your home is.
I can see you've put a lot of thought into this... I'll type slowly for you.
People who like to defend the romantic image of the hacker usually make two mistakes.
One; they assume the crux of the argument is security when it's actually law.
Two; they assume intent should be accounted for after the fact.
The legality of the activity is determined by the possible intent of the actor. When an unauthorized person attempts to bypass a security measure the law is forced to assume they are doing so with malicious intent because they are subverting the means put in place to prevent just that action.
Breaking into a house is identical to breaking into a computer system in that respect.
If a crime could only be charged AFTER a person has circumvented security, so they could be sure of intent, what kind of outcomes would that invite before a charge could be filed?
Seriously, read that last sentence again and think about it.
On the other hand, if there are security issues with IT infrastructure, you probably don't know about them.
Considering this is Slashdot, I would certainly hope most of us would have a better idea of the security of our computer systems/networks than the security of our parent's basement.
It's not very useful for you if somebody tells you that your door locks suck; having crappy locks may even be a conscious decision on your part.
Really? This is what you're going with? Tell me, why exactly would I want crappy locks on my doors? If you're referring to the fact that I don't choose to wrap the house in razor wire and dig a moat, then yes I have taken a laissez-faire approach to domestic security. The reason none of us need to go that far is because breaking into a house in unconditionally illegal and there are LEGAL mechanisms in place to protect me and provide recourse if that should happen. That is the primary deterrent that keeps people from walking around and "checking" their neighbor's locks to make sure they're secure.
It is, however, very useful for you if somebody points out security issues with your computer systems. Having security holes in your system is never (well, rarely) a conscious decision.
Yes it is useful, and there are means to do that which don't involve breaking into someone else's systems and compromising potentially sensitive information--even if only to one person. The difference is that between a hacker and a security consultant.
If a bank's systems are hacked by anyone outside the organization, regardless of what they do with the information, they are required to inform their customers that their data has been compromised. People close accounts, money is lost and there are repercussions that go beyond the romantic image of the lone hacker who's sticking it to the man, but will never know the soft touch of a woman.
If a "nice" hacker had alerted twitter to this issue, the current situation would never have occurred.
Fine, let's assume we live in a world that values the noble efforts of hackers and someone hacked Twitter and alerted them to this problem before an evil cracker used this exploit for his nefarious designs. So we've created an atmosphere where everyone feels secure walking around "checking the locks" as I said earlier.
Are you going to feel more secure knowing there are a lot of people trying to find ways into your system and that some of them are aren't the good kind of hackers and you have no way of knowing what kind of hacker they are until AFTER they've gotten into your system?
As an admin, if you see suspicious activity on your server logs do you want that activity stopped or should yo
Re:Lack of Hacker Ethics (Score:5, Funny)
To show I have a sense of humor, I modded the parent Troll.
Re:Lack of Hacker Ethics (Score:5, Funny)
Re: (Score:2)
Aw, what's the use of going through all that trouble if you can't have Bill O'Reilly announce he's gay? ... and is even such an admission NECESSARY, I would ask?
Re:Lack of Hacker Ethics (Score:5, Insightful)
That's where the 18-year old kid is at fault. He showed a lack of hacker ethics. Good hackers may discover an exploit, but they don't do harm.
Perhaps, but it's likely because this kid did a little harm that he's captured the attention of so many people. It adds a healthy dose of sensationalism to the story which convinces people to treat security seriously better than some hypothetical 'it could have been really bad if..' would"
Re:Lack of Hacker Ethics (Score:5, Insightful)
Um... what kind of harm can you cause by hacking Twitter? It's the internet equivalent of writing on a bathroom wall.
(Yes, I'm aware of the recursive metaphor I'm creating here.)
Comment removed (Score:5, Insightful)
Re:Compromise One Password, Compromise Them All (Score:5, Informative)
No passwords were compromised except for the admin account he used the dictionary attack on. So really, the GP's analysis of harm done is pretty accurate.
Comment removed (Score:5, Interesting)
Re: (Score:2)
I do, and it's perfectly fine!
I mean who'd guess a password like "1FeelDumbEnteringThisPassword" anyway? I'm perfectly safe!
Re: (Score:2)
Using the same password for slashdot as your bank account would be stupid, yes, since nobody wants Cowboy Niel in his bank account, but I do reuse certain passwords.
My various email accounts have the same passwords as each other. My password for the dozens of newspapers I log on to is 111111, easy to remamber and what possible reason would I have for keeping it secret? That password is not for my benefit, it's for the newspaper's benefit, and is only an annoyance to me.
My slashdot password is unique, as is
Re: (Score:2, Informative)
Many credit card companies offer a one-time-use credit card number you can use for online purchases. I find it invaluable for online shopping.
Re: (Score:3, Informative)
Re: (Score:3, Insightful)
wait wait wait... you're on slashdot... news for nerds... and you pay for porn?!
Please hand over your geek card on the way out.
Re: (Score:3, Interesting)
You don't (probably) use the same key for your house and your care and your safety deposit box
No, but I wish I could. They're all on the same key ring, after all. If I lost my keys and whoever found them knew whose keys they were, I'd have to change all the locks anyway.
Another "bad security practice" I do is to keep my passwords written down. That's a no-no in the security field, but it's a stupid no-no. I keep them in my wallet, along with my security code for the building I work in, my money, debit card,
Re: (Score:2)
I do have the same key on all my doors at the house and the mailbox, back gate, garage, shed. That same key also works for my mothers home so I only need 1 key to cover two homes and all areas in those homes. I also had my bike locks all changed to use the same key. as well as my motorcycle was re-keyed so one ket unlocks everything.
Having a different key does nothing. A determined thief will get past everything.
Locks are there to keep crackheads and punk kids out of your stuff.
Re: (Score:3, Insightful)
Locks are for honest people.
If I wanted your motorcycle, I'd bring a couple friends, and throw it in the back of a pickup truck, to be rekeyed later.
If I wanted into your house, I'd kick in the door, or go through a window.
If I wanted into your shed, I'd put a pry bar through the padlock and twist.
It's a good thing I don't want these things. :)
Really, I've helped people get around things they've locked accidentally.
Re: (Score:2, Informative)
Please RTFA before you post. Thank you. The accounts in question had their password reset to a random 12 character string that was then used to post fake tweets. Your comment is irrelevant.
Re: (Score:2)
Re: (Score:2, Insightful)
Yes, in general, if you compromise one password, you might be compromising them all. In this specific case however, the "hacker" in question never got the passwords himself. He got the password-reset tool to help out a user who has forgotten their password. So that's one happy out of the whole thing--there was a good security practice there that actual passwords are a little harder to get at than that.
Re: (Score:2)
I'm sure news agencies and bloggers watch twitter accounts of famous people. Putting in messages (that aren't obviously defacements or spam) could cause incorrect information to spread to "reputable" sources. We've seen bloggers post incorrect information that gets spread around until newspapers pick it up. The same could happen here.
Re: (Score:3, Interesting)
Anyone trusting blogs, twitter, etc. for news is a moron. Any newspaper, news network, etc. doing the same is run by morons, and should go back to journalism school.
Re: (Score:2)
I don't disagree at all. But the fact remains that most people blindly trust mainstream media, and there are some mainstream organizations that report what's found on blogs with no corroborating evidence.
Re: (Score:2)
So what? Let the retards wallow. If you rely on them believing your iCEO is healthy to keep your stock prices up, then you better educate them, or be more open with them. (Then again, iCEO has that awesome backdate stock options feature, so who really cares?)
Re: (Score:2)
Re: (Score:2)
Are you joking? Turn on any 24 hour news channel and eventually you'll see it. CNN even lets anyone post their own news to their site. Average visitors don't consider if it's validated by CNN. Remember incorrect reports of Steve Jobs' health causing the stock price to drop?
Re: (Score:2)
Re: (Score:2)
We've seen bloggers post incorrect information that gets spread around until newspapers pick it up.
Indeed. Steve Jobs just personally announced on Twitter that he has died.
Re: (Score:3, Funny)
Liar, I'm not new here!
Re: (Score:3, Funny)
Liar, I'm not new here!
Oh no, not again... [slashdot.org]
Re:Lack of Hacker Ethics (Score:5, Insightful)
That's where the 18-year old kid is at fault. He showed a lack of hacker ethics. Good hackers may discover an exploit, but they don't do harm.
When I hacked my university's computer network (Vax machines on Bitnet back in 1990), I did it with the knowledge of the sysadmin staff. And once you have made your point, you stand back.
Indeed. At my college a while back, some seniors found a way to hack into the school's network. They posted every user's password on a local network site. Only a handful of weeks away from graduation, they were expelled. Sure, they meant no harm, just to expose the weaknesses in the system, but they broke the rules and seriously compromised the system by posting the passwords, so they had to pay the price. Yikes!
Re: (Score:3, Insightful)
I think if you run a system that a good number of people depend upon, and a breach in security could cause important problems, then you have a serious obligation to institute a good security policy. If you don't, it's negligence and should be treated as such.
Are unethical hackers responsible for their actions? Sure, just as responsible as a business that takes on the trust of its users willingly.
Re: (Score:2)
If pushing out some ironic/satirical messages is already harm, then i don't know ...
Re:Lack of Hacker Ethics (Score:5, Insightful)
As much as I don't want to say it, ethics don't mean crap these days. If you hack into a system and leave a note saying "Hey, hacked your box, here's how I did it, here's how to fix it, Thanks. Signed, Good Samaritan"... It only means they will send an army of lawyers and g-men after you because you embarassed them, and because while techies like us might understand what the hacker wanted to accomplish, management will not. Frankly, given that there is no protection for people who adhere to the hacker ethos as opposed to those who don't, there is no incentive do be nice. If you get the chance, gut the bastards and don't leave anything behind except a zero'd drive and a message on the screen saying "Next time, don't use a 'password' as the root login." Is it damaging? Yes. But if you don't crap the server, all you're doing is beating the hornet's nest with a stick.
It's sad that nobody has thought to pass a law to protect digital good samaritans -- that is, people who discover and report (in good faith) security issues either to the people running the servers directly, or the vendor(s) of the software/hardware that is vulnerable -- provided they do nothing else but confirm the exploit is present and notify the appropriate parties. And, of course, do not retain copies of any sensitive information once the report is made.
Is it any different than finding an unlocked car in the parking lot and opening the door, pushing the door lock, closing the door, and continuing on your merry way? A pity the legal system does not see it this way... Which leaves only the recourse of scorched earth to make the point.
Re:Lack of Hacker Ethics (Score:5, Funny)
Is it any different than finding an unlocked car in the parking lot and opening the door, pushing the door lock, closing the door, and continuing on your merry way?
I like to do this when I find a car sitting outside a gas station still running.
Re: (Score:2)
Haha, yeah, that's a good trick. It sure spooks the kids inside.
Comment removed (Score:5, Insightful)
Re: (Score:2)
It's sad that nobody has thought to pass a law to protect digital good samaritans -- that is, people who discover and report (in good faith) security issues either to the people running the servers directly, or the vendor(s) of the software/hardware that is vulnerable
It will never happen, because "harm" is arguable, so they can accuse you of harm no matter what you do. You should always *always* report these things anonymously. Not doing so is... a learning experience.
If they're (the vulnerable site) going to be that way about it, maybe the solution is to stop reporting anything to them at all. I mean really, if you intend to do something good, why go where you're not wanted? Let them wonder why they've seen a sudden spike of $ACTIVITY and let them find and fix the flaws on their own. Let them explain to their users that they couldn't perform damage control/threat mitigation early on because they have soiled any kind of trust relationship between companies and the wou
Re: (Score:3, Interesting)
Re: (Score:2)
My ethics don't include taking undeserved abuse from someone for whom you are trying to do a significant favor when the favor is on a "take it or leave it" basis so no one is being coerced into anything. This is a situation where trying to do something good can easily get a person prosecuted. There are probably a lot of "white hats" who would help with these things, for free, if only their efforts were appreciated. Laws like this have a significant chillin
Re: (Score:2)
I like CC gun laws just fine, but... they don't really affect crime rates either way. That's more a function of economic opportunity and culture than anything else.
On topic, while I see the good side of pointing out security holes, any time it goes to actively pentesting a site, the perpetrators need to be prosecuted; sure, they don't mean to break things, but a well intentioned idiot can cause a lot of damage, and what would it solve anyway? People who don't care about security won't change just because th
Re: (Score:2)
If they're (the vulnerable site) going to be that way about it, maybe the solution is to stop reporting anything to them at all
Oh, no no no. You report it, just to different people. :-P
"To them" was a key component of that sentence. The implication that you have explicitly stated was intentional.
Re: (Score:2)
Re: (Score:2)
Is it any different than finding an unlocked car in the parking lot and opening the door, pushing the door lock, closing the door, and continuing on your merry way?
If I come upon an unlocked car with the lights on, I won't even shit the guy's lights off for him. The harm he's possibly caused by my lack of being a good samaritan (a dead battery) is far less than the harm that could be caused by me if he or a policeman happened by as I was opening the door and mistook me for a thief.
Help people when you can,
Re: (Score:2, Funny)
I won't even shit the guy's lights off
The guy's already drained his car battery. He doesn't need your vulgarities.
Non-profit required (Score:2)
The harm he's possibly caused by my lack of being a good samaritan (a dead battery) is far less than the harm that could be caused by me if he or a policeman happened by as I was opening the door and mistook me for a thief.
Somebody please start a non-profit legal defense fund to help fight these abuses. It'll better society when a prosecutor doesn't stand a good chance of getting news coverage for prosecuting somebody who pulls a person from a burning car.
Assumptions (Score:3, Insightful)
Is it any different than finding an unlocked car in the parking lot and opening the door, pushing the door lock, closing the door, and continuing on your merry way?
That's a great analogy. How do you know the owner hasn't left his keys under the seat? Security through obscurity is the best strategy for low-value assets.
Re: (Score:2)
Re: (Score:2)
It's sad that nobody has thought to pass a law to protect digital good samaritans
That's retarded. What would you do if you came home, caught someone picking your lock and they said "O hai! Was just gonna point out your security vulnerabilities!"?
A. Kick their ass.
B. Call the cops.
C. Both.
B, maybe C for me.
Re: (Score:2)
Cracking the site was easy, because Twitter allowed an unlimited number of rapid-fire log-in attempts.
...Even Unix (way before Linux) knew to kick you out after 3 failed attempts...
Let me fix that for you...Even Windows does!
Re: (Score:2)
One could use a botnet to execute the DOS attack in that case.
A strategy which might prove a bit more effective is to present the user with a captcha after three failed password attempts. This will not be overly annoying for real users, but it will significantly increase the cost of an attack.
After all of this... (Score:2)
Re:After all of this... (Score:4, Interesting)
Blackberries are safer than Twitter accounts. If you enter the wrong password into a Blackberry a set number of times (usually 10), it erases its contents.
Re: (Score:3, Funny)
That sounds more dangerous; because now my buddy is going to have a blank phone when we go out drinking tonight.
Re: (Score:3, Informative)
That's not why they want him to give it up. Federal alw says that all Presidential emails must be kept and can be used as evidence of wrongdoing. If he keeps his blackberry he's a fool.
Re: (Score:2)
Or preserved for prosperity. It would be amazing to examine the thinking of FDR or Churchill, and many people use their letters to do so. Imagine if all their business coorespondence was in one place.
There has to be someway for a server to archive it all while allowing him access via a blackberry. Even if he has to lean on RIM for a custom server.
Re: (Score:3, Funny)
There has to be someway for a server to archive it all while allowing him access via a blackberry. Even if he has to lean on RIM for a custom server.
A corporate email service archiving mail? Whodathunkit?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Limit logins without DOS? (Score:5, Interesting)
This is one of my favourite security conundrums.
How do you limit someone's login attempts to an account without allowing an account to be denial of serviced?
Captcha - hurts young, old, and disabled users. It can also make it hard for normal users if poorly designed (as many are).
IP Limit - Very easy to bypass with a proxy list.
Hard Account Limits - Denial of service
Thus is the problem. How do you limit logins without hurting legitimate users?
Re:Limit logins without DOS? (Score:5, Insightful)
Re:Limit logins without DOS? (Score:4, Insightful)
Easy, increase the amount of time between the password being supplied and the pass/fail response being sent. If the script has to wait for 5 seconds to see if the password is bad, it increases the dictionary run time by a LOT. The only way around this is to run multiple iterations of the script, each with a section of the list to run. This makes them much easier to spot by other filters.
However, a legit user waiting 5 seconds for the login to complete probably won't generate a lot of complaints.
Re:Limit logins without DOS? (Score:5, Interesting)
Perhaps even add +x seconds after every attempt, so your first attempt goes through and fails the next one has a delay of 5s and thereafter its incremented. Most users will get their password correct on the second try or perhaps the third, the script will die a slow death.
Re: (Score:2)
Perhaps even add +x seconds after every attempt, so your first attempt goes through and fails the next one has a delay of 5s and thereafter its incremented. Most users will get their password correct on the second try or perhaps the third, the script will die a slow death.
The problem with this is that it doesn't prevent the denial of service scenario that the institution of the delay was trying to prevent! If the script is running on the account, the legitimate user now has to wait an incredibly long time to log in.
Re: (Score:2)
Re: (Score:2)
This utterly misses the denial of service side of the issue. If you and your BFF are of the age where Twitter is important to you, but then you stop being BFFs, each of you can remove the other's Twitter access by running a script that constantly tries and fails to log in.
It also misses the point that the moving part in the attack is the username, not the password. If I only get three attempts before it locks me out or becomes too slow to bother with, I'll try password, Password1 and letmein on every userid
Re: (Score:2)
Encryption with a unique keyfob just for you. I'd want that for banks, but not necessarily for Twitter because who cares if I'm now "taking a huge crap in the toilet that's now overflowing."?
Re: (Score:3, Interesting)
One way would be to get progressively slower at *processing* a login for a particular user based on the number of failed attempts. I.e. user enters a password, the timer ticks away, and then at the end it really does the test and checks if the password was right.
You would typically double the time delay with a reasonable limit of say 1 minute so that each failed attempt sticks at 1 minute delay.
You put up a banner after the delay reaches 10 secs or so saying "Your login will be slower as you have had X fail
Comment removed (Score:5, Informative)
Re: (Score:2)
Re:Limit logins without DOS? (Score:4, Insightful)
This is one of my favourite security conundrums.
How do you limit someone's login attempts to an account without allowing an account to be denial of serviced?
Captcha - hurts young, old, and disabled users. It can also make it hard for normal users if poorly designed (as many are).
IP Limit - Very easy to bypass with a proxy list.
Hard Account Limits - Denial of service
Thus is the problem. How do you limit logins without hurting legitimate users?
One approach is to still allow the login but to insert artificial delays. Maybe your password cracker can guess several thousand passwords in one second; too bad, because the site will only allow you to try one every three seconds. Even a fairly weak password can be extremely difficult to guess this way, though it is no substitute for strong passwords that are never sent as cleartext.
Re: (Score:2)
Hard Account Limits - Denial of service
Thus is the problem. How do you limit logins without hurting legitimate users?
Give locked out users the option to send a one-time login link to their e-mail address of record.
It isn't much different than sending out a password reset e-mail.
But it's fairly stupid not to include a hard cap on the # of login attempts per [unit of time]
Re: (Score:2)
Security question after a few attempts. And let people make their own security question.
Re: (Score:2)
One way to do it is to have the person with the locked account call or stop by the helpdesk to get their account password reset.
In the case of twitter it would likely be calling only. Real users have no problem confronting a real human being to get access to their account. Hackers are less likely to. Also, it's a lot more difficult to brute force something involving a phone call to a person every 4 attempts.
DOS, can still be used, but if the user can let you know there's a problem via a phone call you ca
Re: (Score:2)
Re: (Score:2)
Easy... (Score:2)
Re: (Score:2)
Easy, user keys. During account creation, generate a unique user key and send it to the client creating the account and make the login associate to the user key only. This way, the user can carry their key in a usb drive when they move around, the client will simply be directed to encrypt the authentication attempt using the user key.
the following may increase security:
1) associated user name do not affect key generation. (this way the attacker has to guess the user name linked to the key)
2) key morphing sc
Re: (Score:2)
Easy. You throttle the logins. After the first failed login, you add a 1 sec delay. Every subsequent failed login, you double the delay. Reset delay after successful login. Good luck with your million-year dictionary attack.
Re: (Score:2)
I've seen this system used on forums before.
And, this is basically how (some) video games work. Login with the account username, but everything from you appears as your character's name.
Re: (Score:2)
I'd want several, so I could try all the different passwords I've used over the years for unimportant stuff. I use unique and secure passwords for important stuff, but I just not going to bother trying to remember different passwords for a dozen different forums where the worst that could happen is someone posts something rude with my account. So I re-use a standard password with somethign to do with the site appended to it - my Slashdot password might be pa55wordslash, or pa55wordslashdot, or pa55word/., o
Re: (Score:2)
...he would have had to switch proxies every 5 password attempts.
I wonder what the security implications are of IPv6. Until this moment I hadn't really thought about it in that context.
Best Result of Twitter Hack - new movies... (Score:2)
Because of the message from the hacked britney spears account, I found out about a cool indie horror flick - Teeth [imdb.com] - found it online and enjoyed it for the quirky little story that it was.
Obama, a celebrity? (Score:5, Funny)
Somehow it is disturbing that the President-Elect is lumped in with Britney as a celebrity.
What is the level of discourse on Mr. Obama's twitter thing, anyway? I could look, I suppose, but it is more fun to imagine.
---
im in ur white house
secret service bitches following me everywhere. about 3 minutes ago from web
these pancakes are righteous! about 2 hours ago from airforce1r
are ufoz real? I am going to find out! about 4 hours ago from web
I think Hillary just cut the cheese LOLz about 8 hours ago from twitterrific
Re: (Score:2)
You sure that's not Bush's twitter you're imagining? It looks like what one would expect...
why is this news? (Score:2, Insightful)
Why should we care about this? Its not like someones SSN or Credit Card info was stolen. Stuff like this happens all the time.
If you want to defame someone, its a lot easier to just make some wild and unprovable claim on the right webs sites and let the internet do its thing.
Re: (Score:2)
We should care about this because this directly shows end users that many /. readers such as myself support exactly why a weak password such as "happiness" is an inherently bad thing.
Re: (Score:2, Informative)
It wasn't Obama's account that got attacked. They attacked the account of a Twitter administrator, and then got access to the web-based control panel to reset Obama's password. Pretty lame that a) the admin had such a bad password and b) you can access the control panel from the public internet with the same login as your twitter account.
Re:iam3prez (Score:4, Informative)
Looks like you didn't actually read the article. The account of a twitter admin was hacked with a dictionary attack. That account was then used to reset the passwords for various other accounts (Fox News, Obama, Britney Spears, etc) to gain access to those accounts. The original passwords for those additional accounts were not obtained. Only one account (the twitter admin) was hacked, the rest just had their passwords reset.
So why do you hate gay people? (Score:2)
I also dislike the Fox propaganda machine and especially Bill
Don't forget gay people! Your seething hatred of gay people comes out in treating "I am gay" as an insult. How many more frightened people still in the closet will be afraid to come out when it's demonstrated so clearly that "being gay is uncool".
Pretty lame all the way around. It speaks volumes about the attacker that the wittiest attack they could come up with was that.
Re: (Score:2, Funny)
Don't forget lame people! Your seething hatred of lame people comes out in treating "pretty lame" as an insult. How many more frightened people still at home in a wheelchair will be afraid to come out when it's demonstrated so clearly that being "lame" is uncool.
Re: (Score:2)
Don't forget gay people! Your seething hatred of gay people comes out in treating "I am gay" as an insult.
You don't get it. It's not that being gay is bad, it's that people like O'Reilly see that as an insult, and they rant about gay people. It's all about the irony, not homophobia. Why do you think certain Republican politicians make such an effort to tell everybody they aren't gay? There was that one guy who even went on about being proud of his family history having "no divorces" and "no homosexuality".
Re: (Score:2)
You don't get it. It's not that being gay is bad, it's that people like O'Reilly see that as an insult
O'Reilly doesn't see it as an insult, he doesn't care.
Talk about not getting it, using such a phrase with the INTENT OF CAUSING DISTRESS lends further weight to the concept that being gay is bad. You should not promote that ideology in any context. Furthering the meaning for a term you do not wish to use does nothing but increase the power of it, however used.
The britney spears one was much better, instea
Re: (Score:2)
O'Reilly doesn't see it as an insult, he doesn't care.
Are you sure about that?
Talk about not getting it, using such a phrase with the INTENT OF CAUSING DISTRESS lends further weight to the concept that being gay is bad. You should not promote that ideology in any context.
Nonsense. Many gay people themselves get a rise by insinuating that a rigidly straight person is gay. Having it used for ironic humor is a way of "demilitarizing" the word. Remember, "gay" is a word that was reclaimed and repurposed by gay people, from being an insult into a positive thing. I think your attitude towards it will only maintain its power to offend. The only people who find it offensive to be called gay are homophobes.
Re: (Score:2)
Are you sure about that?
Yes, most Republicans are actually pretty open minded. Even a lot of people who do not approve of gay marriage are very tolerant of alternate sexual orientations (like Obama for instance, who also stated he opposed gay marriage). What public statements has O'Reilly made that make you think he has anything against gay individuals in general?
Nonsense. Many gay people themselves get a rise by insinuating that a rigidly straight person is gay
Not my friends. But then they feel comfort