Watch on

anonymous said:

O great fact person: What can we do to be safe against the coming of 4chan?

  • Sign up for tumblr’s “two-factor” security.
  • Block known spammers.
  • Change your tumblr name to include extra letters.
  • Don’t click any links from unknown bloggers until the situation ends.
  • Empty your cache often.
  • Drink plenty of fluids.
  • Wear proper ear protection when reblogging.
  • Never post fashion photos on a Thursday.
  • Liberally apply fungicide to your hard drive.
  • Be familiar with the graphic novel and films of V for Vendetta.
  • Be familiar with popular internet acronyms like “LOL,” “OMFG” and “FTLOGIDKWTOM.”
  • Study Encyclopedia Dramatica thoroughly.
  • Burn the fat, the kidneys and the long lobe of the liver from the sin offering, as the LORD commanded Moses.
  • Stop to smell the roses.
  • Read “Valhalla” by Ari Bach.
  • Remove your two front teeth, this is where 4chan keeps their transponders.
  • Scrub your elbows with a loufa.
  • Eat kosher salamis.
  • Do not talk about Fight Club.
  • Keep your piece, pistols, and cutlass clean and fit for service.
  • Do not pass “Go,” do not collect $200.
  • Email your friends and family hourly to let them know you’re not hacked.
  • Save your urine in jars, you may need it later.

And most importantly of all:

Watch on

When 17-year-old George Hotz became the world’s first hacker to crack AT&T’s lock on the iPhone in 2007, the companies officially ignored him while scrambling to fix the bugs his work exposed. When he later reverse engineered the Playstation 3, Sony sued him and settled only after he agreed to never hack another Sony product.

When Hotz dismantled the defenses of Google’s Chrome operating system earlier this year, by contrast, the company paid him a $150,000 reward for helping fix the flaws he’d uncovered. Two months later Chris Evans, a Google security engineer, followed up by email with an offer: How would Hotz like to join an elite team of full-time hackers paid to hunt security vulnerabilities in every popular piece of software that touches the internet?

Today Google plans to publicly reveal that team, known as Project Zero, a group of top Google security researchers with the sole mission of tracking down and neutering the most insidious security flaws in the world’s software. Those secret hackable bugs, known in the security industry as “zero-day” vulnerabilities, are exploited by criminals, state-sponsored hackers and intelligence agencies in their spying operations. By tasking its researchers to drag them into the light, Google hopes to get those spy-friendly flaws fixed. And Project Zero’s hackers won’t be exposing bugs only in Google’s products. They’ll be given free rein to attack any software whose zero-days can be dug up and demonstrated with the aim of pressuring other companies to better protect Google’s users.

MORE: Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers

If a hacker can obtain a user’s iCloud username and password with iBrute, he or she can log in to the victim’s account to steal photos. But if attackers instead impersonate the user’s device with Elcomsoft’s tool, the desktop application allows them to download the entire iPhone or iPad backup as a single folder, says Jonathan Zdziarski, a forensics consult and security researcher. That gives the intruders access to far more data, he says, including videos, application data, contacts, and text messages.

MOREThe Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

Hackers steal personal data for 25,000 Homeland Security employees


Doesn’t feel so nice when it happens to you, does it?  

from Breitbart:

USIS, the Department of Homeland Security’s contractor for conducting security clearance background checks, has had the personal records of at least 25,000 of its employees stolen because of hackers, and the hackers may have been from a foreign country, according to the Associated Press (AP).

AP’s source was an unnamed DHS official who told AP that Homeland Security would soon let employees know if their personal information had been stolen and encourage them to check their financial accounts.

USIS provides the most background investigations to the federal government of any company, but the company is being targeted with a federal whistleblower lawsuit because it allegedly “dumped” over 600,000 background checks for security clearances, allowing some clearances to be considered complete although they were not completely conducted.

read the rest

When hackers steal data from Homeland Security, it’s considered a crime.  When the government steals data from private citizens, it’s called “Homeland Security.”

How to deal with 4chan being a bully to tumblr.

Obviously 4chan is trying to bully and scare tumblr because deep down it has a crush on tumblr. it wishes to tell tumblr of its feelings and how much it truly loves it. 4chan has not had these sort of feelings before. The only logical way we can deal with this issue is by shipping them together, let them know its okay. tumblr x 4chan. It doesn’t need to be smut, hell if it’s about homestuck, maybe make it in the 4 quadrants. Just saying, the only way to fight back is to flirt back with a ship. Do what we do best. Obviously 4chan has some weird things about their selves and we do as well. Maybe we could work out our problems together