iceberg
Diamond Member
- May 15, 2017
- 36,788
- 14,919
- 1,600
then extent of your buy-off is just hope.well phishing isn't really a hack when you give your password out now is it?simply depends on the hack and how they got in. firmware vulnerabilities, environment vulnerabilities not on the server (ie - firewall, web server, sql server and the like) but at this point again - we seem to be giving every benefit of the doubt to a group that wouldn't let the FBI even have a copy - just trust crowdstrike.not going to play what's more likely.
what's more likely is that if you're the victim of a crime you don't get to tell police what they get to investigate. please show me where this is common practice and maybe we can go on. til then this is just bluster and hype and guesswork on your part.
if the DNC didn't want the disruption, source that fact and show me they said that. your saying that is a likely reason simply won't cut it.
when you act strangely, you being doubt upon yourself you're willing to look past. i'm sure if trump did this you'd not say "hey they just didn't want to be bothered...".
When it comes to hacking, sending forensic copies and not actual hardware is common practice.
In some versions of the servergate conspiracy theory now espoused by Trump, nothing less than physical possession of the hardware will suffice, because Crowdstrike, a respected security firm helmed by a former senior FBI agent, might be part of the deep stateās efforts to frame Putin. White scoffs at that notion, noting that National Republican Congressional Committee is one of Crowdstrikeās customers.
āIāve done incident response for defense contractors and healthcare groups, this is all standard practice,ā said White. āItās completely defensible in terms of best practices and what was going on.ā
When the computers belong to a cooperating victim, seizing the machines is pretty much out of the question, said James Harris, a former FBI cybercrime agent who worked on a 2009 breach at Google thatās been linked to the Chinese government.
āIn most cases you donāt even ask, you just assume youāre going to make forensic copies,ā said Harris, now vice president of engineering at PFP Cyber. āFor example when the Google breach happened back in 2009, agents were sent out with express instructions that you image what they allow you to image, because theyāre the victim, you donāt have a search warrant, and you donāt want to disrupt their business.".
Trumpās āMissing DNC Serverā Is Neither Missing Nor a Server
This isn't actually strange at all. Do you have anything to offer suggesting that it is unusual?
The FBI and special council determined how they got in. They used stolen credentials from a spearphishing attack.
You see, you ask me for something to corroborate, but it's never enough. There is no satisfying your doubt. It's impossible.
in any event, i've posted many facts and articles to support my position. you post things like "well this makes sense to me so i'll run with it" and now call me impossible because i won't accept that.
if i tell you how *I FEEL* about something, you going to let me call it fact and that i must be right, or ask for more?
i'm betting door #2. so expect no less from me. but if all we're gonna do is dance around the questions with your suppositions then i'm gonna move on.
The extent of your position is just doubt. It's just skepticism. There's no more to it. No alternative conclusion. No evidence suggesting something else happened.
Your facts and articles in support of your position are loaded with their own holes. Everywhere from VIPS to Imran Awan. All irrelevant or easily debunked.
bye.