Posted on 10/21/2016 3:17:02 PM PDT by Quicksilver
The Obama administration should not have attempted to misuse its instruments of state to stop criticism of its ruling party candidate.
I’m not an expert, but I know that it doesn’t take much to take down a single web site or web service. A DDoS (distributed denial of service) attack is where a large number of computers (sometimes referred to as a botnet) floods a single web site or web service with overwhelming requests. If many web sites or web services depend on the targeted machine then it will also take them down as well. That’s what happened today, a critical web service, DNS (Domain Name System), was targeted and taken down.
Assange has several others around the world.
I still think most if not all of it came from inside
That is a position they can take. They risk damaging their party for decades. If that is a risk they want to take, have at it. We don’t know how bad it is gonna get but we do know it is getting worse by the day. The Rats know how bad it gets. Do they want to risk everything?
Not the way a deadman switch works. Once you hit it you have to be out. Otherwise you are begging for pain.
She came. She saw. She wanted to drone someone.
Because they assumed he was dead and were enacting revenge? that’s how I read it
Wow. Thanks.
Bookmarking...
I dont trust obama at all. He is capable of anything.
Couldn’t someone run billions of combinations to get access? or is that just in the movies :)
Bttt.
5.56mm
Stop the bleeding?? Try to talk to Seth Rich about
that! How many people have conveniently died (convenient for the DNC) this year to protect Hillary's sorry ass?
My point: The current Lords of the DNC
from Obama to Hillary and all of the lesser lights of that criminal
political party don't give a damn about bleeding!! They will murder anyone
(especially Republican candidates) who appears to able to get in
the way of their plans of conquest and of imposing their twisted agenda on all of America.
Once Trump said that he was going to look into Hillary's
"situation" if elected -- well they will stop at
to prevent that from happening, because it will expose
them all! All of the stinking filthy corruption of Bill,
Hillary and the Chicago political/financial crime syndicate
that now has America in its clutches.
In other words, in order stop the bleeding, they'll do anything! Hillary must be elected at all costs to protect themselves.
I know, if the deadman switch was executed then Assange would have zero access to WikiLeaks and maybe zero lines of communication to WikiLeaks.
Every thing I’ve seen it’s those Anonymous guys and Wikileaks. Anonymous hasn’t been quiet about it either.
But it doesn’t specifically say the attack was done by Wikileaks supporters.
It’s ambiguous.
Wikileaks supporters could be *among* those who attacked.
Yep, inside job is the simplest explanation of how the emails got released.
I take it as a response to John Kerry pressuring Ecuador to cut off Assange’s internet access. I.e., “you cut off our access, we’re going to cut off yours”.
WikiLeaks Verified account @wikileaks
We have updated the Stochastic Terminator algorithim.
6:32 PM - 21 Oct 2016
339 RETWEETS 600 LIKES
It’s definitely not Assange on Twitter . He is not the one releasing the emails either. Someone else is on his behalf.
WikiLeaks Verified account @wikileaks
We have updated the Stochastic Terminator algorithim.
6:32 PM - 21 Oct 2016
339 RETWEETS 600 LIKES
I had that argument with another freeper. He claimed there are secret encryption algorithms. I stated that there are no secret encryption algorithms. Of course I have no way of knowing that. However the NSA along with NIST have developed several public encryption algorithms that were reviewed and critiqued by top worldwide encryption experts. Those algorithms are in fact used by the government and most US companies. It would go against all accepted practice to use a secret algorithm.
A company that invents and uses its own algorithm is not doing itself any favors. The secrecy must be in the key and the key alone in order to assure that the a cyber loss is not a catastrophe. If you lose a key in a cyber attack you have lost one key and life goes on. If you lose an algorithm which, being code, is harder to protect than a key which is data, that is a catastrophe.
Thus I would end any speculation about secret encryption algorithms. I speak strictly as an applied crypto expert with two decades of experience, not as an insider or anything like that.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.