Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

WikiLeaks The Obama administration should not have attempted to misuse its instruments [tr]
WikiLeaks ^ | WikiLeaks

Posted on 10/21/2016 3:17:02 PM PDT by Quicksilver

The Obama administration should not have attempted to misuse its instruments of state to stop criticism of its ruling party candidate.


TOPICS: Extended News; Front Page News; News/Current Events; Politics/Elections
KEYWORDS: cyberattack; hillary; obama; wikileaks
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-77 next last
To: dp0622

I’m not an expert, but I know that it doesn’t take much to take down a single web site or web service. A DDoS (distributed denial of service) attack is where a large number of computers (sometimes referred to as a botnet) floods a single web site or web service with overwhelming requests. If many web sites or web services depend on the targeted machine then it will also take them down as well. That’s what happened today, a critical web service, DNS (Domain Name System), was targeted and taken down.


41 posted on 10/21/2016 4:32:33 PM PDT by Quicksilver (Trump / Pence 2016)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Quicksilver

Assange has several others around the world.

I still think most if not all of it came from inside


42 posted on 10/21/2016 4:33:27 PM PDT by Jaded (Pope Francis? Not really a fan... miss the last guy who recognized how Islam spread... the sword.ag)
[ Post Reply | Private Reply | To 40 | View Replies]

To: Lady Heron

That is a position they can take. They risk damaging their party for decades. If that is a risk they want to take, have at it. We don’t know how bad it is gonna get but we do know it is getting worse by the day. The Rats know how bad it gets. Do they want to risk everything?


43 posted on 10/21/2016 4:43:05 PM PDT by wastoute (Government cannot redistribute wealth. Government can only redistribute poverty.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: Quicksilver

Not the way a deadman switch works. Once you hit it you have to be out. Otherwise you are begging for pain.


44 posted on 10/21/2016 4:45:07 PM PDT by wastoute (Government cannot redistribute wealth. Government can only redistribute poverty.)
[ Post Reply | Private Reply | To 40 | View Replies]

To: Travis McGee

She came. She saw. She wanted to drone someone.


45 posted on 10/21/2016 4:49:07 PM PDT by justa-hairyape (The user name is sarcastic. Although at times it may not appear that way.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: backspace

Because they assumed he was dead and were enacting revenge? that’s how I read it


46 posted on 10/21/2016 4:49:40 PM PDT by longfellowsmuse (last of the living nomads)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Quicksilver

Wow. Thanks.


47 posted on 10/21/2016 4:54:26 PM PDT by dp0622 (IThe only thing an upper crust conservative hates more than a liberal is a middle class conservative)
[ Post Reply | Private Reply | To 41 | View Replies]

To: longfellowsmuse

Bookmarking...


48 posted on 10/21/2016 4:56:57 PM PDT by WildHighlander57 ((WildHighlander57, returning after lurking since 2000)
[ Post Reply | Private Reply | To 46 | View Replies]

To: Arthur Wildfire! March

I dont trust obama at all. He is capable of anything.

Couldn’t someone run billions of combinations to get access? or is that just in the movies :)


49 posted on 10/21/2016 4:57:06 PM PDT by dp0622 (IThe only thing an upper crust conservative hates more than a liberal is a middle class conservative)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Quicksilver

Bttt.

5.56mm


50 posted on 10/21/2016 4:59:46 PM PDT by M Kehoe
[ Post Reply | Private Reply | To 1 | View Replies]

To: wastoute
"At what point do the Rats, like the GOP did with Nixon
and say “ENOUGH IS ENOUGH”. The Rats are ALREADY
at a point where even if she wins Hillary could
be indicted before she is sworn in. When do the Rats
decide to stop the bleeding?"

Stop the bleeding?? Try to talk to Seth Rich about
that! How many people have conveniently died (convenient for the DNC) this year to protect Hillary's sorry ass?

My point: The current Lords of the DNC
from Obama to Hillary and all of the lesser lights of that criminal
political party don't give a damn about bleeding!! They will murder anyone
(especially Republican candidates) who appears to able to get in
the way of their plans of conquest and of imposing their twisted agenda on all of America.

Once Trump said that he was going to look into Hillary's
"situation" if elected -- well they will stop at
to prevent that from happening, because it will expose
them all! All of the stinking filthy corruption of Bill,
Hillary and the Chicago political/financial crime syndicate
that now has America in its clutches.

In other words, in order stop the bleeding, they'll do anything! Hillary must be elected at all costs to protect themselves.

51 posted on 10/21/2016 5:28:28 PM PDT by StormEye
[ Post Reply | Private Reply | To 23 | View Replies]

To: wastoute

I know, if the deadman switch was executed then Assange would have zero access to WikiLeaks and maybe zero lines of communication to WikiLeaks.


52 posted on 10/21/2016 5:37:56 PM PDT by Quicksilver (Trump / Pence 2016)
[ Post Reply | Private Reply | To 44 | View Replies]

To: Arthur Wildfire! March

Every thing I’ve seen it’s those Anonymous guys and Wikileaks. Anonymous hasn’t been quiet about it either.


53 posted on 10/21/2016 5:48:57 PM PDT by CommieCutter
[ Post Reply | Private Reply | To 15 | View Replies]

To: Quicksilver

But it doesn’t specifically say the attack was done by Wikileaks supporters.
It’s ambiguous.
Wikileaks supporters could be *among* those who attacked.


54 posted on 10/21/2016 5:56:13 PM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Jaded

Yep, inside job is the simplest explanation of how the emails got released.


55 posted on 10/21/2016 6:25:54 PM PDT by Prolixus (Proud to be irredeemably on Hillary's "Enemies List")
[ Post Reply | Private Reply | To 42 | View Replies]

To: Chaguito

I take it as a response to John Kerry pressuring Ecuador to cut off Assange’s internet access. I.e., “you cut off our access, we’re going to cut off yours”.


56 posted on 10/21/2016 6:26:12 PM PDT by randita
[ Post Reply | Private Reply | To 19 | View Replies]

To: randita
WikiLeaks

WikiLeaks – Verified account ‏@wikileaks

We have updated the Stochastic Terminator algorithim.

6:32 PM - 21 Oct 2016

339 RETWEETS 600 LIKES

57 posted on 10/21/2016 6:41:24 PM PDT by chuck allen
[ Post Reply | Private Reply | To 56 | View Replies]

To: SwampFoxSC

It’s definitely not Assange on Twitter . He is not the one releasing the emails either. Someone else is on his behalf.


58 posted on 10/21/2016 6:49:43 PM PDT by HollyB
[ Post Reply | Private Reply | To 21 | View Replies]

To: HollyB
WikiLeaks

WikiLeaks – Verified account ‏@wikileaks

We have updated the Stochastic Terminator algorithim.

6:32 PM - 21 Oct 2016

339 RETWEETS 600 LIKES

59 posted on 10/21/2016 6:50:57 PM PDT by chuck allen
[ Post Reply | Private Reply | To 58 | View Replies]

To: Arthur Wildfire! March
Unfortunately, the NSA was hacked over the summer, and the US government demands that all encryption algorithms of US companies be stored there.

I had that argument with another freeper. He claimed there are secret encryption algorithms. I stated that there are no secret encryption algorithms. Of course I have no way of knowing that. However the NSA along with NIST have developed several public encryption algorithms that were reviewed and critiqued by top worldwide encryption experts. Those algorithms are in fact used by the government and most US companies. It would go against all accepted practice to use a secret algorithm.

A company that invents and uses its own algorithm is not doing itself any favors. The secrecy must be in the key and the key alone in order to assure that the a cyber loss is not a catastrophe. If you lose a key in a cyber attack you have lost one key and life goes on. If you lose an algorithm which, being code, is harder to protect than a key which is data, that is a catastrophe.

Thus I would end any speculation about secret encryption algorithms. I speak strictly as an applied crypto expert with two decades of experience, not as an insider or anything like that.

60 posted on 10/21/2016 6:56:21 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 38 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-77 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson