Hackers breach Clinton campaign chairman's Twitter account
Source: CNN
John Podesta's Twitter account was hacked on Wednesday, according to a campaign spokesman, prompting the campaign to inform the social media site of the breach.
The hack comes in the midst of the ongoing release of Podesta's emails, which was stolen and are now being released by Wikileaks. The emails have been embarrassing for the Clinton campaign, bringing internal machinations of the campaign -- and some off-color comments -- into the public.
On Wednesday, as Clinton landed in Las Vegas, Podesta's seemingly tweeted, "I've switched teams. Vote Trump 2016. Hi pol."
Read more: http://www.cnn.com/2016/10/12/politics/john-podesta-twitter-hack-hillary-clinton/index.html
Gee, wonder who did that...
Foggyhill
(1,060 posts)So, one is linked to the other
SunSeeker
(51,550 posts)jberryhill
(62,444 posts)alcibiades_mystery
(36,437 posts)turbinetree
(24,695 posts)or teletype machines, or a fax machine
Midnight Writer
(21,751 posts)riversedge
(70,197 posts)Midnight Writer
(21,751 posts)riversedge
(70,197 posts)csziggy
(34,136 posts)Request for Comments: 1149 BBN STC
1 April 1990
A Standard for the Transmission of IP Datagrams on Avian Carriers
Status of this Memo
This memo describes an experimental method for the encapsulation of
IP datagrams in avian carriers. This specification is primarily
useful in Metropolitan Area Networks. This is an experimental, not
recommended standard. Distribution of this memo is unlimited.
Overview and Rational
Avian carriers can provide high delay, low throughput, and low
altitude service. The connection topology is limited to a single
point-to-point path for each carrier, used with standard carriers,
but many carriers can be used without significant interference with
each other, outside of early spring. This is because of the 3D ether
space available to the carriers, in contrast to the 1D ether used by
IEEE802.3. The carriers have an intrinsic collision avoidance
system, which increases availability. Unlike some network
technologies, such as packet radio, communication is not limited to
line-of-sight distance. Connection oriented service is available in
some cities, usually based upon a central hub topology.
Frame Format
The IP datagram is printed, on a small scroll of paper, in
hexadecimal, with each octet separated by whitestuff and blackstuff.
The scroll of paper is wrapped around one leg of the avian carrier.
A band of duct tape is used to secure the datagram's edges. The
bandwidth is limited to the leg length. The MTU is variable, and
paradoxically, generally increases with increased carrier age. A
typical MTU is 256 milligrams. Some datagram padding may be needed.
Upon receipt, the duct tape is removed and the paper copy of the
datagram is optically scanned into a electronically transmittable
form.
Discussion
Multiple types of service can be provided with a prioritized pecking
order. An additional property is built-in worm detection and
eradication. Because IP only guarantees best effort delivery, loss
of a carrier can be tolerated. With time, the carriers are self-
Waitzman [Page 1]
RFC 1149 IP Datagrams on Avian Carriers 1 April 1990
regenerating. While broadcasting is not specified, storms can cause
data loss. There is persistent delivery retry, until the carrier
drops. Audit trails are automatically generated, and can often be
found on logs and cable trays.
Security Considerations
Security is not generally a problem in normal operation, but special
measures must be taken (such as data encryption) when avian carriers
are used in a tactical environment.
Author's Address
David Waitzman
BBN Systems and Technologies Corporation
BBN Labs Division
10 Moulton Street
Cambridge, MA 02238
Phone: (617) 873-4323
EMail: dwaitzman@BBN.COM
https://www.ietf.org/rfc/rfc1149.txt
It's even been adapted for Linux!
RFC-1149
April 28th, 2001
11 years ago, April 1st 1990, rfc 1149 was written. This rfc specifies a protocol for IP over avian carriers, CPIP (carrier pigeon internet protocol). In 11 years, noone has bothered to implement this important protocol stack. But happily, we dont need to wait any longer! BLUG in cooperation with Vesta Brevdueforening has given you rfc 1149 support for Linux.
Vital information
Date: April 28 2001, 12:00
Place: Bergen
Addresses:
Lyngbøveien 61, contact: Audun Larsen.
Bråtet Terrasse 21, contact Kjell Haldorsen.
Details from the actual implementation day.
A preliminary writeup of the event.
Log of the ping session
Vegards pictures.
Bjørns pictures.
Karl Magnus pictures.
Technical details and links
The software being used.
rfc 1149
Internet Engineering Task Force
GOCR/JOCR
Minutes from BOFs (Birds of a Feathers)
Minutes from the BOF on march 6th 2001
http://www.blug.linux.no/rfc1149/
riversedge
(70,197 posts)csziggy
(34,136 posts)They certainly had fun playing with the pigeons!
turbinetree
(24,695 posts)I just finished a book about written about the art of espionage during WWII
The book name is
The Secret War Spies, Ciphers, and Guerrillas, by Max Hastings
Talk to the person twice a day somehow, over the phone or like in person every 48 hours and if you know that your password has been comprised, change it, whatever this team or him are doing is not working. Bring back the Navajo code talkers
Great Idea,
Pencil and Paper or snail mail, the mail system is pretty darn good in this country, they can have something to you in less than 24 hrs.
As we speak, three states have had there voting machines hacked or compromised, in my opinion if that happens, you had out ballots, with a pencil, they use to do once before, back in the day, this electronic BS is for what reason, so that election can be called on some tv for ratings BS----but I digress
Old and In the Way
(37,540 posts)Why isn't anyone hacking the RNC servers? I suspect there is far more interesting emails to read.
Response to Old and In the Way (Reply #5)
Post removed
cynzke
(1,254 posts)EXCEPT......they didn't vet Trump. He completely fooled them like he fooled the GOP. Now there is hardly anything they could leak about Clinton that could be worse than the revelation that Donald Trump is a sexual predator and a pedophile.
Old and In the Way
(37,540 posts)Maybe, in addition to holding his massive debt, they also have videos of Trump during his business trips to Moscow, playing with underage girls? Maybe Trump was pushed into this race by Putin. I really can't figure out why he wanted to run for office, given the low pay and headaches that the office brings.
Cha
(297,154 posts)Damn.. I can't wait to get rid of these assholes.
wishstar
(5,268 posts)It's like, who cares what Hillary's campaign staffers quibbled about since obviously she and the campaign made the correct choices in how to proceed, i.e. doing press conferences and providing press access on her plane etc.
yallerdawg
(16,104 posts)But fake emails and fake speech transcripts described by Fox and Trump surrogates are unimaginable.
Just like 30 year old allegations of sexual impropriety have no place in a campaign.