← Back to context

Comment by cyberlimerence

8 days ago

Every other intelligence agency on the planet is about to scoop a ton of American data via cyber and basic HUMINT. It's free for all out there, I guess.

Its not just this website. Since DOGE, China probably canceled all vacation days for their hackers, as its a free for all. Firing of most so many people including security departments and most likely the (good) femboy furry hackers.

Is the newly created user with name "bigballs" who downloads whole government databases a foreign TA or just DOGE? Who knows. Who cares, certainly not the Government.

The data and access gained currently by China, Russia, NK and SA will continue to be useful until and way after the next war.

  • Oh I have no doubt about that. You have people, who would not be able to obtain a security clearance in a 100 years if they tried, running around, accessing government databases and taking "backups" offsite. Maybe law enforcement/Pentagon/intelligence data is not under threat at the moment, but in a couple of years who knows. Meanwhile people get fired, proper access protocols and communications continue to breakdown, and you get chaos. And every spy agency loves chaos.

    • Nothing they have done or will do is supposed to make America better, it's designed to destabilize the country. They want America to fail so that they can rule over the ashes.

    • I'm honestly just hoping "security by obscurity" is helping things for the moment. There's no way a 20 year old is figuring out the data structures of an entire department and getting all the data in a single day.

      1 reply →

    • > Maybe law enforcement/Pentagon/intelligence data is not under threat at the moment

      the payments data would tell a lot about intelligence networks for example or about various Pentagon contractors.

      Remember Assange? He did a decade under house arrest for a leak paling in comparison to what happens today. How times have changed.

      5 replies →

  • > Is the newly created user with name "bigballs" who downloads whole government databases a foreign TA or just DOGE? Who knows. Who cares, certainly not the Government.

    Someone willing to work without morals for money can just be bought by the next highest bidder. Anything they touch should be treated as compromised.

    • If they'd only been downloading data that would be bad enough, but they've been modifying code as well, code that they don't understand. It's the biggest security disaster in recent history (perhaps Kim Philby giving everything to the Russians was worse) and entirely self-inflicted.

  • They don't even need to: they have direct access via their agents. Such as the new intelligence chief and a couple of the DOGE boys who've already been caught directly selling NDA'd information.

    • Sorry if this comes across the wrong way; I'm just trying to stay in the loop: Is that referring to the DOGE boys who were caught between months and years ago, or is there a confirmed leak of the new information?

      1 reply →

  • I think the good thing is that the DOGE team seem extremely humble and willing to learn from their mistakes, rather than pass the blame in ignorance. Just like their leader!

  • > Firing of most so many people including security departments and most likely the (good) femboy furry hackers.

    Why is this not a joke?

    Edit: Rethorical question.

  • Is there a source for the vacation days thing? That's the kind of story that has an apocryphal vibe to it like the Pentagon Domino's Pizza meter has.

    • >> Since DOGE, China probably canceled all vacation days for their hackers, as its a free for all.

      > Is there a source for the vacation days thing?

      The "vacation days" line seems to be a jokingly hyperbolic prediction. China might have directed more resources (including hackers) toward collecting the data exposed by DOGE and Elon Musk's actions (and might try to widen the crack), but is unlikely to have literally cancelled all vacation days for said hackers.

      1 reply →

Tinfoil hat mode: "What if" this results from a foreign influence?

But I guess that you don't need to find answers externally when stupidity is a much simpler reason

  • I've been wondering this myself, not that I necessarily believe it. If they _were_ acting at the behest of a foreign adversary (pick your reason: leverage over an individual because of a targeted campaign, leverage over all of them because of the SolarWinds/Salt Typhoon hack, cash, etc.), how different would their actions look?

    • Sometimes the tool doesn't have to know he's a tool. The Russians use the term "useful idiot".

      They've created the back doors, I'm sure that the Russians and the Chinese are now in the systems the DOGE people broke.

Or they could just, like, call Tulsi Gabbard.

  • Unfortunately she is too busy for that.

    She'll just invite her friend Bashar al-Assad to assist.

    I have read on the news he recently became #opentowork.

Is there any evidence that the contents of the database are accessible? The linked article doesn't make these claims.

Is there any evidence that the database for this microblog of a cloud flare hosted website has anything of importance in it?

Are you also (alone) suggesting there's a tunnel from cloud flare (where this is hosted) to some larger government database?

You may want to RTFA: https://archive.ph/wy1Wt

  • I think you are missing the entire point of this. It's not that it had sensitive data or anything of importance. It is that a .gov domain under the command of the self proclaimed Mr. Efficiency and smartest person of Earth about servers and car manufacturing was wide open for script kiddies to deface and access data from. It is a show of hypocrisy and how cutting corners like Dr. Emerald Mine Child here wants will shape the rest of this administration.

    • > Every other intelligence agency on the planet is about to scoop a ton of American data via cyber and basic HUMINT

      I was replying to what was written. I read this as implying that sensitive (or any) data was available.

      > and access data from

      Again, is there any evidence that any data was accessible, beyond what is visible on the webpage? If you read the article, the flaw was that anything could be pushed. Could you link a source that says extra data was accessible? Your claim is not made in the above article, and I can't find anything mentioning data access, with a quick search.

      1 reply →