Nightmare Come True: User Pays $2.6 Million in Transaction Fees to Send $134 of Ether | Altcoins – Bitcoin News

A record ethereum transaction fee has been paid today: $2.6 million to transfer $134.

The user probably mixed up the fields on the value of the transfer and the fee, eventually paying 10,668 ETH in fees, or $2.6 million, on a transaction mined by Sparkpool.

A nightmare come true, the customer sent 0.55 ether, worth $133.95, according to a record of transactions broadcast on the Ethereum (ETH) network. The money was sent to an address on the South Korean crypto exchange Bithumb.

The funds may be lost forever. Most blockchains are built to prevent transactions from being reversed once the sender confirms it.

Moreover, the fee may have since been distributed to the different miners under Sparkpool as a reward for processing transactions.

Sparkpool said in a tweet on June 10: We are further investigating the incident of unusually high tx feeThere will be a solution in the end.

The Chinese miner has previously repaid a user half of the 2,100 ETH accidentally paid as fees in a 0.1 ether transfer.

There is suspicion of underhand dealing, with some members of the Ethereum community alleging manipulation of the transaction by Sparkpool, or that it was an attempt at evading tax, or money laundering.

In general, the average ETH transaction fee is up more than 637% since January, as the network became congested due to a high number of transactions passing through it.

Transactional errors are not uncommon in the crypto industry, but they dont often come as big as the latest ether gaffe. In 2017, someone paid 50 bitcoin (BTC) in transaction fees to send just under 10 BTC.

Some analysts suggest that blockchain networks should be able to reject transactions if the fee exceeds the average highest fees of the previous 10 blocks mined, just in the same way, say, the Bitcoin blockchain rejects fees that are too low.

What do you think about errors in cryptocurrency transactions? Let us know in the comments section below.

Image Credits: Shutterstock, Pixabay, Wiki Commons

Read more:
Nightmare Come True: User Pays $2.6 Million in Transaction Fees to Send $134 of Ether | Altcoins - Bitcoin News

A Bitcoin Indicator that Sent Price 2,757% Higher in 2016 Flashes Again – Bitcoinist

Bitcoin is struggling to close above $10,000 in the past three months, but it may head exponentially higher if a super-bullish technical play out as planned.

So sees Eric Thies, a prominent market analyst, who spotted the so-called Chaikin Money Flow, or CMF, on Bitcoins monthly charts. The technical indicator, by definition, combines an assets volume and price action by considering that the former leads the latter.

CMF moves above and below zero based on whether, on average, the stock is finishing in the upper portion of the daily range or the lower portion respectively, reads its description on BinaryOptions.net.

Each day is multiplied by volume, so a down day accompanied by big volume will result in a lower indicator reading than a down day on small volume.

BTCUSD monthly CMF is climbing above zero for the first time since 2016 | Source: Eric Thies

The last time CMF moved above zero was in September 2016 when Bitcoin was trading near $700, noted Mr. Thies. Its occurrence followed an exponential price rally that eventually sent the cryptocurrency up by 2,757 percent to $20,000 in December 2017.

1M CMF suggests that smart money is climbing into the market as its closing in [towards] zero, wrote Mr. Thies. Anything rising above zero is bullish for the Chaikin Money Flow.

Mr. Thies studied the CMF tool in conjugation with another popular technical indicator, the Stochastic Relative Strength Indicator, noting that it helped to determine the bitcoins 2016-2017 bull run.

The BTCUSD monthly Stock RSI enters bullish area | Source: Eric Thies

In May 2020, the Stock RSI on Bitcoins monthly chart crossed to the upside, right when the CMF is looking to make a similar move above zero. The 2016 fractal showed the same pattern: the Stoch RSI jumping above 50, thus confirming a bullish bias, followed by the CMFs jump into the positive area.

Mr. Thies noted that Stoch RSI above 50 is a bull trend with continuation. Meanwhile, the analyst added that its occurrence typically leads to a 300 percent price rally.

1M SRSI has crossed-up, and each time this has happened led to 3x returns at least, he said.

That puts Bitcoins upside price target near $30,000.

The technical analysis appeared as Bitcoin struggles to move past $10,000 despite a favorable macroeconomic scenario. But Mr. Thies noted that short-term bearish moves do not have any authority to predict a long-term bias.

Looking at the cryptocurrencys charts from monthly perspectives prove that even the daily, weekly, and bi-monthly charts could flip into bullish territory.

Follow this link:
A Bitcoin Indicator that Sent Price 2,757% Higher in 2016 Flashes Again - Bitcoinist

Bitcoin IRA Is Ready to Take On Small Savers With Updated Retirement Savings Product – CoinDesk – CoinDesk

Crypto retirement savings firm Bitcoin IRA is ready to take on smaller accounts with the launch of its new IRA product, Saver IRA.

Around four years ago, Bitcoin IRA launched its first self-directed individual retirement account that required balance minimums of $20,000. Now the firm has dropped that minimum to $3,000 for a standard account. With the addition of Saver IRA, the company has a no-balance-minimum account that instead requires a monthly deposit minimum of $100.

When its time to make the decision of when to buy, youll find that folks who want to get their toes wet will freeze, said Chris Kline, Bitcoin IRAs chief operating officer. This gives them a dollar-cost average mechanism without having to think about it every month.

As COVID-19 lockdowns continue to dampen the global economy, Kline said he believes more consumers will look for alternative retirement funds.

I think youre going to see a lot of tightening of belts, a lot less 401(k)s being offered by providers out there possibly, or not matching, Kline said.

Although Kline has been speaking to his staff about the Saver IRA account since November 2018, this is the first time Bitcoin IRA has had enough resources in its compliance department and automation to handle thousands of smaller accounts.

The firm also had to build an application programming interface (API) that would allow users to implement direct deposit.

Around 80% of Bitcoin IRAs existing clients have signed up for the account but Saver IRA is primarily geared for new crypto IRA adopters, Kline added. This coming November Bitcoin IRA plans to further diversify its offering by allowing users to earn interest on their crypto, he said.

The leader in blockchain news, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups.

Original post:
Bitcoin IRA Is Ready to Take On Small Savers With Updated Retirement Savings Product - CoinDesk - CoinDesk

Poloniex, Bittrex Named in Lawsuit Involving the Alleged Tether-Fueled Crypto Pump – Bitcoin News

On April 3, the cryptocurrency community learned about 11 class-action lawsuits against various executives and digital asset companies. The law firm that filed the lawsuits is also involved with a class-action against Tether and Bitfinex for allegedly manipulating the price of bitcoin. On June 4, the plaintiffs and the litigation firm, Roche Cyrulnik Freedman added the trading platforms Bittrex and Poloniex to the defendant list.

Plaintiffs Pinchas Goldshtein, Benjamin Leibowitz, Jason Leibowitz, Matthew Script, and Aaron Leibowitz are suing Ifinex, the parent company of Tether and Bitfinex. The lawsuit was announced last year and the plaintiffs are represented by the same lawyers that recently filed 11 class-action suits against certain crypto companies and executives. Alongside this, the law firm represents the Kleiman estate in the case versus Craig Wright as well.

According to the recent filing against Ifinex, through the use of the exchange Bitfinex and using tether (USDT), the four firms allegedly created a sophisticated scheme that coopted a disruptive innovation cryptocurrency and used it to defraud investors, manipulate markets, and conceal illicit proceeds.

Part-fraud, part-pump-and-dump, and part-money laundering, the scheme was primarily accomplished through two enterprises, the lawsuit states referring to the exchange and popular stablecoin USDT.

The amendment to the case filed on Wednesday implicates Poloniex and Bittrex as well. The claim is that all the named defendants took part in the scheme and helped manipulate the price of BTC.

The case was originally filed in October 2019, and the plaintiffs are seeking a whopping $1.4 trillion before punitive or treble damages. The latest filing suggests that Poloniex and Bittrex ostensibly used wallets that were created specifically to launder large amounts of USDT.

Given the size and regularity of these transfers through a mechanism they created for that exact purpose and their perfect visibility into the transactions, Bittrex and Poloniex knew the manipulative effect of the transactions on their exchanges, the updated court filing highlights. The plaintiffs further allege:

For otherwise peripheral exchanges, these large trades of purportedly fiat-backed USDT created an impression of legitimacy and consumer trust, leading to further trades and fees for the two exchanges.

Financial columnist Danny Nelson spoke with a Bitfinex and Tether Representative who said that the accusations are not tied to facts. [The lawsuit is] untethered to either the facts or the law, Stuart Hoegner explained to Nelson. [The plaintiffs] conflate perceived correlation with causation in an effort to prop up theories that are untrue and unsupportable, he added in an emailed statement.

Just recently, news.Bitcoin.com spoke with Roche Cyrulnik Freedman partner, Kyle Roche, in an in-depth interview about the crypto cases his firm has filed in the last two years.

What do you think about Poloniex and Bittrex being added to the Ifinex lawsuit? Let us know in the comments below.

Image Credits: Shutterstock, Pixabay, Wiki Commons, Tether Logo,

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Read disclaimer

See the article here:
Poloniex, Bittrex Named in Lawsuit Involving the Alleged Tether-Fueled Crypto Pump - Bitcoin News

What is Pizzagate? The fake news scandal involving Hillary Clinton and Wikileaks explained – and why its trending amid Epstein inquiry – The Scotsman

NewsPoliticsA new Sky documentary that investigates some of the most mind-boggling conspiracy theories of recent years has been shining a new light on some of the most baffling fake news stories to come out of the US

Wednesday, 10th June 2020, 4:06 pm

After Truth: Disinformation and the Cost of Fake News aired earlier this month, and surveys the effects of disinformation campaigns on social media and the impacts of well known conspiracy theories.

One of those theories is that of Pizzagate, and the film follows the growth of the story on forums like Reddit and 4chan, how it was fomented by the alt-right and Alex Jones, and then translated into a real-life dangerous situation.

Heres everything you need to know:

Pizzagate was a widely discredited news story which linked Hilary Clintons presidential campaign with a fictional human trafficking ring.

Its so-called because the alleged headquarters of the operation was the Comet Ping Pong pizzeria in Washington, D.C, which according to the conspiracy was also a meeting ground for Satanic ritual abuse.

It all began in March 2016, when the personal email account of John Podesta, Clinton's campaign manager, was hacked.

WikiLeaks published the emails later that year; conspiracy theorists claimed the emails contained coded messages that alluded to human trafficking and a child sex ring.

The emails contained multiple references to pizza and pizza restaurants, but there is no evidence that they are code or refer to anything else.

Had the claims been true, it would have implicated a number of high-ranking Democratic Party officials.

How was the story debunked?

The story has been widely debunked by a number of fact checking a news organisations from across the political spectrum even Fox News has said the story is completely false.

Theorists claimed that similarities between Comet Ping Pongs logo contained symbols linked to Satanism and paedophilia; the New York Times noted these similarities could be found in the logos of completely unrelated companies, if you looked hard enough.

Claims of a secret underground network beneath Comet Ping Pong were disproven by the fact the establishment has no basement, and evidence that John Podesta played a part in the kidnapping of Madeleine McCann were simply sketches of a suspect taken from the descriptions of two eyewitnesses.

No alleged victims have come forward and no physical evidence has been found.

Despite the theory having zero evidence to support it, that didnt stop those who opposed Hilary Clinton believing the story wholesale.

That included gunman Edgar Maddison Welch, who travelled down from South Carolina to confront the owners of Comet Ping Pong.

He entered the pizza restaurant in Washington D.C. packed with families on a Sunday afternoon and fired an automatic rifle.

Thankfully, no one was injured in the disturbance; Mr Welch told police he had driven from South Carolina to investigate the restaurant after reading online reports.

Why is Comet Ping Pong back in the news?

Though its been four years since the height of the Pizzagate story, the owners still have to deal with death threats and abuse.

As employees continue to search for a new rhythm [during the coronavirus pandemic], say the Washington Post, they still field calls from Pizzagate obsessors.

A few weeks ago, someone jammed the phone line for an entire day, frustrating customers who struggled to place orders. [Comet] has received almost 70 Pizzagate messages in recent weeks.

There also seems to be a renewed interest in the false story in the wake of news that US prosecutors want a face-to-face interview with Prince Andrew over the Jeffrey Epstein scandal.

The story has been trending on Twitter again, despite remaining completely untrue, with theorists linking Epsteins private jet the Lolita Express and his private Epstein Island with the restaurant.

There is no evidence to suggest any of it is true.

More:
What is Pizzagate? The fake news scandal involving Hillary Clinton and Wikileaks explained - and why its trending amid Epstein inquiry - The Scotsman

Cork IT worker accused of sending personal HSE files to Wikileaks – Echo Live

The HSE has secured High Court orders preventing an IT worker from distributing highly confidential and sensitive information about hospital patients.

It is alleged that Neill Bradley from Cork had distributed confidential information he obtained from the HSE computer servers during the course of his now-former employment with a third party contracted by the HSE to perform certain IT services.

The information includes patients' personal data and medical databases allegedly sent by Mr Bradley to Wikileaks, the non-profit organisation that publishes news leaks provided by anonymous sources.

The orders were granted by Mr Justice Tony O'Connor, whosaid he was satisfied Mr Bradley had gained access to private and sensitive data through his former employment.

The judge noted the defendant in one post on social media had referred to information he obtained, which Mr Bradley knew should be kept secure.

The HSE launched proceedings against Mr Bradley following a probe it commenced after becoming aware of a potentially serious data breach from posts on social media of screenshots of the HSE's internal servers.

The HSE claims the posts appeared on three Twitter accounts it says were set up and controlled by Mr Bradley.

Through those accounts, Mr Bradley allegedly sent messages to a senior official at the HSE, as well as posting to the social media accounts of Taoiseach Leo Varadkar, Ministers Simon Harris and Pascal Donohoe, media figures and Dr Tony Holohan.

In his communications, Mr Bradley made allegations of a cover-up and a scam by the HSE and said he would make public data from over a dozen Irish hospitals, it is claimed.

It is also claimed he used various hashtags on his posts including #covid19 #lockdown Ireland #notmytaoiseach #MAGA and #mediascum.

The HSE said during previous employment as a systems administrator Mr Bradley was given access to its servers and patient databases to carry out tasks his previous employer was contracted to do.

That firm's role was to maintain and service a 'smart' automated system used to dispense, record and manage medication given to patients at various hospitals called Omnicell.

The system is used in many hospitals throughout the state.

Since becoming aware of the situation the HSE, in co-operation with Mr Bradley's previous employer, who terminated his employment after learning of the HSE's concerns, have taken steps to secure the servers and prevent the information from being published.

These steps include having posts on thepastebin.comsite and links to the confidential material removed.

The HSE also sought and obtained court orders, including injunctions to prevent him from attempting to post more links to confidential information.

The injunction is to remain in place pending the outcome of any full hearing of the matter.

The application for the injunctions was initially heard in-camera, meaning that the proceedings were in private.

The Judge subsequently lifted the in-camera ruling allowing the media to report on the case.

In its action, the HSE, represented by Eoin McCullough SC, Joe Jeffers Bl instructed by Philip Lee solicitors sought the orders against Mr Bradley with an address at Carrigeen Hill, Conna, Co Cork.

Counsel said Mr Bradley had been informed of the application against him.

However he did not attend, nor was he represented during, the court hearings.

Mr Justice O'Connor in making the orders said Mr Bradley would be given the chance to advance a defence to the HSE's claims at a full hearing of the action.

The injunction restrains Mr Bradley and any person to whom he has communicated or may communicate the confidential information from disseminating publishing, communicating by any means, or using any of said information through specific twitter handles and email addresses attributed to him.

The order also restrains the defendant, and anyone who received the confidential information from him, from destroying or deleting the information.

He must also deliver up all documents, records and devices containing the confidential information to the HSE's solicitors for forensic analysis.

The court further restrained Mr Bradley from leaving Ireland until he has complied with the order to deliver up the confidential information, and hand over his passport to An Garda Sochana, who will retain it until further order.

The HSE solicitors were given permission to notify the Department of Foreign affairs, An Garda Sochana, authorities at all points of exit from the State about the court's orders.

Mr Justice O Connor said that Mr Bradley had said in another tweet that he had sold his house and was moving about Europe in a camper van to "ply my skills elsewhere."

The judge also noted the HSE lawyers undertaking to give the Data Protection Commissioner, the Minister for Health and the Attorney General copies of the order and the documents put before the court during the application if requested by those parties.

Read the original here:
Cork IT worker accused of sending personal HSE files to Wikileaks - Echo Live

HSE takes action against man who leaked patient information to Wikileaks – Offaly Express

The HSE has secured High Court orders preventing an IT worker from distributing highly confidential and sensitive information about hospital patients. It is alleged that Neill Bradley had distributed confidential information he obtained from the HSE's computer servers during the course of his now former employment with a third party contracted by the HSE to perform certain IT services.

The information includes patient's personal data and medical databases allegedly sent by Mr Bradley to Wikileaks the non-profit organisation that publishes news leaks provided by anonymous source founded by Australian internet activist Julian Assange.

The orders were granted last week by Mr Justice Tony O'Connor, whosaid he was satisfied that Mr Bradley had gained access to private and sensitive data through his former employment, which he threatened to facilitate the dissemination of patients details and private records.

The judge noted that the defendant in one post on social media had referred to information he obtained, which Mr Bradley knew should be kept secure, as being "stolen. "

The HSE launched proceedings against Mr Bradley following a probe it commenced after becoming aware of a potentially serious data breach from posts on social media of screenshots of the HSE's internal servers.

The HSE claims the posts appeared on three twitter accounts it says were set up and controlled by Mr Bradley.

Through those accounts Mr Bradley allegedly sent messages to a senior official at the HSE, as well as posting to the social media accounts of Taoiseach Leo Varadkar, Ministers Simon Harris and Pascal Donohoe, media figures and Dr Tony Holohan.

In his communications, Mr Bradley made allegations of a cover-up and a scam by the HSE and said he would make public data from over a dozen Irish hospitals, it is claimed.

It is also claimed that he used various hashtags on his posts including #covid19 #lockdown ireland #notmytaoiseach #MAGA and #mediascum.

The HSE said during previous employment as a systems administration Mr Bradley was given access to its servers and patient databases to carry out tasks his previous employer was contracted to do.

That firm's role was to maintaining and servicing a 'smart' automated system used to dispense, record and manage medication given to patients at various hospitals called Omnicell.

The system is used in many hospitals throughout the state.

Since becoming aware of the situation the HSE, in co-operation with Mr Bradley's previous employer, who terminated his employment after learning of the HSE's concerns, have taken steps to secure the servers and prevent the information from being published.

These steps include having posts on thepastebin.comsite and links to the confidential material removed.

The HSE also sought and obtained court orders, including in junctions to prevent him from attempting to post more links to confidential information.

The injunction is to remain in place pending the outcome of any full hearing of the matter.

The application for the injunctions was initially heard in camera, meaning that the proceedings were in private. The Judge subsequently lifted the in camera ruling allowing the media to report on the case.

In its action the HSE, represented by Eoin McCullough SC, Joe Jeffers Bl instructed by Philip Lee solicitors sought the orders against Mr Bradley with an address at Carrigeen Hill, Conna, Co Cork. Mr Bradley had been informed of the application against him.

However he did not attend, nor was he represented during, the court hearings.

Mr Justice O'Connor in making the orders said Mr Bradley would be given the chance to advance a defence to the HSE's claims at a full hearing of the action.

The injunction restrains Mr Bradley and any person to whom he has communicated or may communicate the confidential information from disseminating publishing, communicating by any means, or using any of said information through specific twitter handles and email addresses attributed to him. The order also restrains the defendant, and anyone who received the confidential information from him, from destroying or deleting the information.

He must also deliver up all documents, records and devices containing the confidential information to the HSE's solicitors for forensic analysis.

The court further restrained Mr Bradley from leaving Ireland until he has complied with the order to deliver up the confidential information, and hand over his passport to An Garda Sochana, who will retain it until further order.

The HSE's solicitors were given permission to notify the Department of Foreign affairs, An Garda Sochana, authorities at all points of exit from the State about the court's orders.

Mr Justice O Connor said that Mr Bradley had said in another tweet that he had sold his house and was moving about Europe in a camper van to "ply my skills elsewhere."

The judge also noted the HSE's lawyers undertaking to give the Data Protection Commissioner, the Minister for Health and the Attorney General copies of the order and the documents put before the court during the application if requested by those parties.

Go here to see the original:
HSE takes action against man who leaked patient information to Wikileaks - Offaly Express

Anonymous Explained: Everything you need to know about the hacktivist group – The Indian Express

Written by Om Marathe, Edited by Explained Desk | New Delhi | Updated: June 9, 2020 9:34:41 am The worldwide group is believed to include anyone who wants to join; its members being referred to as anons. (Source: Wikimedia common)

As racial tensions in the US continue to make headlines, the hacktivist group Anonymous is back in focus with social media handles believed to be associated with it promising retribution for the death of George Floyd.

On May 28, in a video posted on an unconfirmed Facebook page, a speaker wearing Anonymouss signature Guy Fawkes mask accused the Minneapolis police of having a horrific track record of violence and corruption and threatened to expose its many crimes, TIME reported.

Since then, the group has been accused of carrying out a cyberattack on the websites of the city of Minneapolis and its police department, making them temporarily inaccessible. The webpage of a United Nations agency was also defaced, and replaced with a memorial carrying an Anonymous symbol that read Rest In Power, George Floyd!

The group has been described as a decentralised online collective with no particular political affiliation, that rallies around causes such as opposing censorship and government control and promoting freedom of speech. In the past, it has expressed support for the Occupy movement and Julian Assanges WikiLeaks. The worldwide group is believed to include anyone who wants to join; its members being referred to as anons.

A signature characteristic of Anonymous is the Guy Fawkes mask, portrayed in the dystopian novel and film V for Vendetta, in which an anarchist anti-hero wearing the mask fights against a fascist, white supremacist government. Even beyond the internet, sympathisers of the movement have sported the Guy Fawkes at rallies around the world.

Another attribute of the group is the use of voice changers or text-to-speech programmes that let anons mask their voice in video messages.

Anonymous does not use any verified social media handles, with multiple factions using portals such as the AnonNews website and Twitter account for disseminating the groups motives and campaigns.

The movement is believed to have started on imageboard websites such as 4chan in the early 2000s, and first became famous in 2008 when it unleashed cyberattacks on the Church of Scientology after the latter sought to remove from the internet a controversial video of filmstar Tom Cruisean outspoken Scientologist speaking about his religious beliefs.

In 2010, Anonymous was believed to be responsible for cyberattacks on Visa, MasterCard, and PayPal, after the financial services firms blocked donations to the controversial whistleblower WikiLeaks.

In 2011, Anonymous launched a tirade against the Westboro Baptist Church, a denomination known for its extreme opposition to homosexuality. Also that year, the group was alleged to have sabotaged electronics giant Sonys PlayStation network, after anons accused Sony of backtracking from providing an advertised feature. During the 2011 Arab Spring, it went after government websites in Egypt and Tunisia.

Express Explainedis now onTelegram. Clickhere to join our channel (@ieexplained)and stay updated with the latest

A year later, after the US banned the popular file-storage website Megaupload, Anonymous shut down the websites of the Federal Bureau of Investigation (FBI) and the Department of Justice. In April 2012, Time magazine named Anonymous in its Worlds 100 Most Influential People list.

Also in 2012, the hacking movement called for protesters across India to oppose what it considered growing government censorship of the internet after a Chennai court demanded 15 service providers to block access to file-sharing websites such as Pirate Bay.

Over the years, the group has targetted child pornography websites and recruiting portals for the Islamic State. It has also gone after government agencies such as the Central Intelligence Agency (CIA) and the Pentagon in the US and the Scotland Yard in the UK.

This is not the first time that Anonymous has taken part in protests against racial discrimination in the US. In 2014, anons attacked the City Hall website of Ferguson, Missouri, after the fatal shooting of Michael Brown, and threatened cyber attacks against police and local government if protesters were harmed.

Anonymous is known to primarily employ what is known as Distributed Denial of Service (DDoS) attacks, in which hackers swamp a websites server with data that causes it to crash, making the website inaccessible.

Another tactic that it uses is defacement when the target websites pages are replaced with the hacktivists messages and graphics. A related method is redirection in which a change in the chosen web sites addressing causes its users to be redirected to another page.

The group also uses more serious methods such as doxing, in which private or sensitive information is stolen, destroying data using computer viruses, and phishing for extracting personal data.

Anonymous members have had several run-ins with the law, with government agencies making arrests for computer hacking, fraud, and cyber-stalking.

In 2017, American hacktivist James Robinson was sent to prison for six years after being convicted for carrying out DDoS attacks. Another hacker, Deric Lostutter, was sentenced to two years in prison after infiltrating the website of a high school sports team for exposing the alleged coverup of a 2012 rape case.

The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines

For all the latest Explained News, download Indian Express App.

The Indian Express (P) Ltd

Follow this link:
Anonymous Explained: Everything you need to know about the hacktivist group - The Indian Express

Russia’s 2020 plan – The Week

The Kremlin has been emboldened by its successful attack on the 2016 election, and is coming back for more. Here's everything you need to know:

Will Russia interfere again?It never stopped. The Russian trolls and military hackers who undermined U.S. democracy in 2016 have continued their efforts to confuse and divide Americans, all U.S. intelligence agencies agree. As November approaches, the Kremlin is engaged in a multi-front cyberattack. Russia deployed social media bots to boost Sen. Bernie Sanders' (I-Vt.) presidential campaign, U.S. officials said, and last week, the National Security Agency announced that a hacking group called Sandworm part of the Russian military unit that stole 50,000 Democratic National Committee emails in 2016 has launched a campaign to penetrate email servers in the U.S. Security experts were puzzled why Russia didn't wreak more havoc in 2016 after targeting election systems in all 50 states and penetrating Illinois' registration database. It was probably "reconnaissance," Michael Daniel, a cybersecurity expert, told Congress preparation for an even more ambitious future strike.

What's their objective? To sow chaos, inflame existing political divisions, and destroy public faith in elections and democracy. Dezinformatsiya, the tactic of pumping propaganda into rival nations, flourishes on social media, where Russians can easily pose as Americans. Russian deceit, however, is not limited to online activities: Russia infiltrated the National Rifle Association and evangelical groups in 2016 and organized at least 22 political rallies on U.S. soil. Russians tamper with election infrastructure and then exaggerate the success of their efforts, seeking to make Americans believe that election outcomes could be illegitimate. If Hillary Clinton won in 2016, Russia planned to spread the hashtag #DemocracyRIP.

What did Russia do in 2016?Four U.S. spy agencies, a GOP-controlled Senate committee, and Special Counsel Robert Mueller all concluded that Moscow ordered the attack in 2016 to spread disinformation and help elect Donald Trump. Russia's cyber operation, directly approved by Russian President Vladimir Putin, employed more than 800 people who created memes, fake accounts, and bogus news articles to stoke Republican fear and anger and to convince Sanders supporters and African Americans that Clinton was corrupt and a racist. The DNC emails Russia stole and selectively published via WikiLeaks showed that party officials wanted Clinton to win the primaries angering Sanders' supporters. In his 22-month investigation, Mueller did not find proof of an explicit criminal conspiracy between the Russians and the Trump campaign, but he did conclude that Russia had interfered "in a sweeping and systematic fashion" and that the Trump campaign had been "receptive" to Russia's help. Some 272 contacts between Trump's campaign and Russia-linked operatives were documented, with 38 in-person meetings. Trump aides overheard Roger Stone later convicted of obstructing the Mueller probe discussing coming WikiLeaks dumps with Trump. Trump's campaign manager, Paul Manafort, gave detailed state polling data to a Russian oligarch and later lied about it. Standing beside Putin at a summit meeting in Helsinki in 2018, Trump said, "I don't see any reason" why Russia would have interfered.

What's Russia's strategy this year?Disinformation campaigns will be more sophisticated. Russians often did a sloppy job imitating Americans in 2016, posting in broken English from accounts traceable to St. Petersburg. Now Russians are thought to be working from U.S. servers. An analysis of Russia-linked Facebook posts last fall found a focus on stirring up racial resentments, spreading fear of immigrants and Muslims, and inciting gun owners. The accounts targeted battleground states such as Michigan, Wisconsin, Ohio, Arizona, and Florida.

Are election systems vulnerable? The nation's nearly 8,000 local voting jurisdictions use a complex patchwork of websites, databases, and hardware, giving hackers countless potential targets. In the 2018 midterm elections, an estimated one-third of jurisdictions used voting machines that were at least 10 years old. Russia is clearly keen to exploit American weaknesses, and in February, an aide to Director of National Intelligence Joseph Maguire told Congress that Moscow will try to ensure Trump's re-election. Trump berated Maguire for the briefing and fired him days later. The new DNI, former Rep. John Ratcliffe (R-Texas), is a fierce Trump defender who has questioned whether Russia really favored Trump in 2016.

How is the U.S. fighting back?Last year, Congress allocated $425 million to beef up the security of state elections systems. Many security experts say it's too late for states to implement major improvements by November. Still, intelligence services have toughened up U.S. defenses in some respects. On the day of the 2018 midterms, the U.S. military launched its first preemptive cyberattack against Russia, blocking internet access at the St. Petersburg troll farm. Nonetheless, 41 percent of Americans say the U.S. is not prepared to secure November's election. To succeed, Russia only needs Americans to doubt the results. "You don't actually have to breach an election system in order to create the impression that you have," said Laura Rosenberger, director of the Alliance for Securing Democracy. "Chaos is the point."

Targeting vote totalsElection officials have insisted for years that voting systems are not connected to the internet and therefore can't be hacked. But it would take only a second of online activity for those machines to be compromised, and last August, a group of cybersecurity experts discovered dozens of back-end election systems in 10 states that had been connected to the internet, some for over a year. Moreover, many counties use wireless modems, some embedded directly in voting machines, to transmit results quickly to state officials. Russia is preparing to exploit this technology, allegedly sending GRU operatives to Rio de Janeiro and other cities to conduct operations through "close-access hacking," which allows break-ins through Wi-Fi networks. Hackers could exploit components of the election hardware chain, including wireless-enabled printers, USB drives with registration rolls, or digital check-in tablets. Harri Hursti, a data security expert from Finland, believes tampering with vote counts is possible. "Once you understand how everything works," Hursti says, "you understand how fragile everything is."

This article was first published in the latest issue of The Week magazine. If you want to read more like it, you can try six risk-free issues of the magazine here.

Go here to read the rest:
Russia's 2020 plan - The Week

Twitter: The false Pizzagate conspiracy explained debunked theory fuelled by social media! – HITC – Football, Gaming, Movies, TV, Music

If youve been searching through your Twitter feed recently then you may have seen the phrase #pizzagate trending.

Youre probably just as confused as everyone else is by this strange phrase that actually has nothing much to do with pizza at all.

The term actually refers to a completely false conspiracy theory relating to American politicians Hilary Clinton and John Podesta back in 2016.

The theory is now being resurfaced in light of the Madeleine McCann and Jeffrey Epstein cases, and everyone is talking about it on Twitter heres exactly what it means.

The debunked conspiracy refers to a news story that began back in 2016 that involved Hilary Clinton and John Podesta.

These false claims linked the American politicians with a highly advanced paedophile ring that was said to be run from a pizza restaurant in Washington DC called Comet Ping Pong, hence the name Pizzagate.

It all began when the personal email account of John Podesta, who at the time was in close contact with Hilary Clinton, were leaked.

The compromised emails were then posted onto Wikileaks and available online to the general public.

People started looking at the emails and thought that some of them seemed a bit strange. Conspiracy theorists pointed out some potential code words that they thought linked the politicians to this sex-trafficking system.

However, there is no actual evidence that this is the case.

The conspiracy has little factual evidence, and has mostly just been fuelled by social media.

Many of the claims were simply just public opinion, which has been escalated and widely shared online.

Fake news online is a big issue in our current society, with people believing things just because it has been written online.

It is your own choice whether you believe or debunk a conspiracy theory like this one, but you must remember that without real supporting evidence, it can never be deemed as the truth.

In other news, What does No Healthy Upstream mean on Spotify? Is there a fix?

See the original post here:
Twitter: The false Pizzagate conspiracy explained debunked theory fuelled by social media! - HITC - Football, Gaming, Movies, TV, Music