Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
... had taped to it: a sheet with user-ids and passwords for the DOD computers on the base used by the desk occupant while on the base.
I used to work for DoD.
Their protocols were, shall we say, lacking.
I was not an IT person, so, when I showed one of them how I could, using their protocols, capture the someone else's account, they were not happy. But they did change the protocol.
Quote:
Originally Posted by Dane_in_LA
Oh, 100% agree. It would take some pretty serious skullduggery even so - no operating system I'm aware of saves usernames/passwords in cleartext.
In the past 10 years, I have known one commercial site that saved them in the clear. And, for a time (hope this has changed) at least one OS had an option to save them in "reversible" encryption, to ensure people didn't reuse "parts" of their previous passwords, in their new passwords.
Quote:
Originally Posted by Dane_in_LA
People are sloppy. But - that would have been one set of credentials. Gathering a number of credentials - particularly from a company with IT as its main business - is a different kettle of fish. IT can't read your passwords.
Not normally, but the IT dept is capable of sabotaging the protocols so that they could capture them. (At least, with today's systems.)
I am not sure of the legal stuff here (that changes from time to time, place to place and is apparently a different standard if you are Democrat of Deep State), but the existence of a spreadsheet of passwords, if real, would indicate the IT department was seriously rogue.
If the spreadsheet was fake, that would be a different conversation. Either way, if someone took money for it, I suspect that would be illegal, but I don't know all of the legal issues. Seeing where all of this goes, might be interesting.
I find it pretty ludicrous that such a spreadsheet would exist.
If such a spreadsheet does exist, I would say that their ridiculously lousy security would be grounds for smartmatic to be removed from anything to do with elections.
There is no indication that the spreadsheet came from Smartmatic, nor would that make any sense. The more likely scenario is that hackers either hired by someone, or working freelance, sent socially-engineered viruses to employees of Smarmatic containing keystroke grabbers which then circulated through the company, collecting and mailing the passwords back to the hacker who in turn entered them into a spreadsheet.
There is no indication that the spreadsheet came from Smartmatic, nor would that make any sense. The more likely scenario is that hackers either hired by someone, or working freelance, sent socially-engineered viruses to employees of Smarmatic containing keystroke grabbers which then circulated through the company, collecting and mailing the passwords back to the hacker who in turn entered them into a spreadsheet.
That is still a serious IT failure, but plausible. Would only work if the keystroke grabber was custom built so that their anti-malware systems couldn't detect it.
Just one reason all critical systems should be air gap protected.
Might not stop an attack but it would sure slow it down.
I think, if the "spreadsheet" is real, it is more likely to have come from an insider.
(That is where most serious breaches occur.)
That is still a serious IT failure, but plausible. Would only work if the keystroke grabber was custom built so that their anti-malware systems couldn't detect it.
Just one reason all critical systems should be air gap protected.
Might not stop an attack but it would sure slow it down.
I think, if the "spreadsheet" is real, it is more likely to have come from an insider.
(That is where most serious breaches occur.)
Why would any company have a spreadsheet of employees passwords? How would they even get them? No modern operating system stores them in clear text. I think you even said that yourself.
Why would any company have a spreadsheet of employees passwords? How would they even get them? No modern operating system stores them in clear text. I think you even said that yourself.
As with all things having to do with Sidney Powell, this feels like a half-baked movie plot.
But it would appear that if the OAN people thought they had an actual list of credentials - real or not - they may have committed a fairly serious crime in passing it on without involving law enforcement. Intent counts.
As with all things having to do with Sidney Powell, this feels like a half-baked movie plot.
But it would appear that if the OAN people thought they had an actual list of credentials - real or not - they may have committed a fairly serious crime in passing it on without involving law enforcement. Intent counts.
Possibly.
If they did break any laws, I am sure we will hear about it.
The Left is itching like a dog with mutant fleas, to put every Trump supporter they can get to, in prison, because that is better than having someone in power that isn't going along with the NWO.
The Stalinist Democrats are already putting dissidents and political opponents in prison, or trying to, so it should come as no surprise that they are now trying to imprison journalists who don't report what the regime says they should report. And, equally unsurprising, the Democrat Party lapdogs have no problem with it.
Smatmatic and OAN have settled. unfortunately it's a confidential settlement so no real information can be extracted.
I'm sure OAN had to pay $$$$$ to get a settlement from Smartmatic. As they should.
Remember, FOX paid almost $800M to Dominion for lying about the company and election fraud with Dominion machines.
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.