It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: carewemust
a reply to: crankyoldman
Read the lawsuit's "Introduction" paragraph:
It reads like something they wrote the day after Hillary lost. It bears no resemblence to what is now known.
Sarsour, co-chair of the Women's March on Washington, has become the face of ISNA. She spoke at an ISNA conference in Chicago last summer in which she praised Wahhaj Sr. as her "favorite person" and called on U.S. Muslims to wage political jihad against the Trump administration. Since that time she has been working to elect far-left Democrats to public office such as Dr. Abdul El-Sayed in Michigan, Alexandria Ocasia-Cortez in New York, and Stacy Abrams in Georgia.
And to my favorite person in this room, that’s mutual, is Imam Siraj Wahhaj, who has been a mentor, motivator, and encourager of mine. Someone who has taught me to speak truth to power, and not worry about the consequences. Someone who has taught me that we are on this earth to please Allah and only Allah, and that we are not here to please any man or woman on this earth. So I am grateful to you Imam Siraj, and you might think this is weird, but every once in a while, when I get into that deep dark place, Imam Siraj comes and talks to me. And he helps me to emerge out of those places, so I’m grateful to you Imam Siraj, and may Allah bless you and protect you for a long time for our community, because we need you now more than ever.
I’m very honest, you should try it
In fact I’m sure you will remember this but Most of the Longtime Q collective in here where honestly wanting to watch that alledged HRC video online, says it all
How about claiming that many here were a little too eager to watch the frazzldrip video
Crowdfense, a Dubai-based company which buys exploits from researchers and then sells them to government agencies, is making it somewhat easier for people who may not usually sell exploits to get into the industry.
Thursday, the company announced its so-called Vulnerability Research Platform, where researchers can submit and sell individual exploits, rather than requiring a full chain. It provides a web interface for researchers to communicate and coordinate their sale to Crowdfense. The idea is to streamline the acquisition and submission process, as well as draw in researchers who may not ordinarily sell to firms like Crowdfense.
“We are now dealing with researchers who are not on the market,” Andrea Zapparoli Manzoni, the director of Crowdfense, told Motherboard in an interview at the annual Black Hat hacking conference on Thursday.
Israeli cybersecurity firm Check Point Software Technologies said Wednesday it had uncovered a security flaw in Whatsapp, that could allow hackers to modify and send fake messages in the popular social messaging app.
Check Point said the vulnerability gives a hacker the possibility “to intercept and manipulate messages sent by those in a group or private conversation” as well as “create and spread misinformation.”
It said the flaw allows bad actors to use the ‘quote’ feature in a group conversation to change the identity of the sender, even if that person is not a member of the group; to alter the text of someone else’s reply, essentially putting words in their mouth; to send a private message to another group participant that is disguised as a public message for all, so when the targeted individual responds, it’s visible to everyone in the conversation.
A spokesperson has confirmed to Motherboard that a May update for the Snapchat iOS app exposed a "small amount" of its source code, and that someone posted that code to GitHub.
...it appears that at least some people had a chance to grab the code before it was taken down. Security researchers appeared to be sharing the source material among each other. You might not see an in-the-wild exploit as a result, but this could lead to the discovery of vulnerabilities that Snap hasn't patched with subsequent updates.
Having access to the source code of iBoot gives iOS security researchers a better chance to find vulnerabilities that could lead to compromising or jailbreaking the device, Levin said. That means hackers could have an easier time finding flaws and bugs that could allow them to crack or decrypt an iPhone. And, perhaps, this leak could eventually allow advanced programmers to emulate iOS on non Apple platforms.
originally posted by: erikthegreen
a reply to: crankyoldman
Nice breakdown Cranky...definitely chuckled when I saw the "lovely" and "clowns" wording. Did you notice the edits? Seems Trump added a space between "messages" and "to" and also removed a trailing period (less important).
Q !!mG7VJxZNCI ID: a92e3a No.2556980 📁
Aug 11 2018 14:21:45 (EST) NEW
How do you prevent the public release of incriminating acts that would forever strip their power away?
How do you BIND the hands of POTUS?
>>Test strength of midterms through private analysis (win/loss ratio)
>>Analysis below key metric w/o chance for recovery - START A WAR.
Think missile(s) accidentally fired.
Relationships are VERY IMPORTANT.
The SHARING of INFORMATION IS VERY IMPORTANT.