The IRC servers used by AnonOps have been compromised and taken over by "Ryan," who is reportedly a young man in Essex, England. These servers were used to plan and coordinate many of the denial-of-service attacks that flew the Anonymous flag, including the recent attack on Sony. Ryan says he seized control of the servers and lots of other infrastructure in protest of a secretive cabal of Anonymous "leaders" whom, he claims, secretly steer Anonymous's debate over which targets to hit and for how long using private IRC channels.
Anonymous claims to have no leaders, but it also lacks any sort of structure through which such a claim could be made -- that is, lacking any constitution or formal decision-making structure, there is no clear way in which an official "no leaders" policy could be ratified and articulated. If no one can speak for Anonymous, can anyone say (on behalf of Anonymous), "We have no leaders?" It's the key question in this bit of drama, because the ousted "leaders" have made counterclaims that Ryan acted as he did in order to establish himself as leader of Anonymous.
Others argued against this equivalence. "Ryan was the dictator, not the one who decided to solve the dictator problem," said one. Another responded, "Lol, how do you know? For all you know, Owen and Ryan are just the classic generals duking out to take over."
The hackers hacked: main Anonymous IRC servers invaded
For his part, Ryan told the UK's Thinq today that he shared the concerns over private decision making. Owen and the other leaders "crossed the barrier, involving themselves in a leadership role," Ryan said. "There is a hierarchy. All the power, all the DDoS--it's in that [private] channel."
But among those who backed AnonOps, one thing was clear: Ryan needs to get got. Anons quickly embarked on a mission to find Ryan "dox," and quickly unearthed what they said was his full name, his home address (in Wickford, Essex, UK), his phone number, his Skype handle, and his age (17).
(Image: Anonymous Declaration of IndepenDance. Wallpaper (3923x4656), a Creative Commons Attribution (2.0) image from thinkanonymous's photostream)
Whoever created the Wcry ransomware worm — which uses a leaked NSA cyberweapon to spread like wildfire — included a killswitch: newly infected systems check to see if a non-existent domain is active, and if it is, they fall dormant, ceasing their relentless propagation.
Persirai is a new strain of Internet of Things malware that infects more than 1,250 models of security camera, all manufactured by an unnamed Chinese manufacturer that has sold at least 185,000 units worldwide.
DBO writes, “A new report by Deflect Labs tracks the complex ways that hackers have sought to take down the Black Lives Matter website. The attacks, which relied on harvesting WordPress sites, increased in sophistication and left a murky, unsavory trail by actors who did everything from try to extort the website to taking it […]
If you are camping during rainy season, or just want a TSA-approved lighter, these plasma torches make perfect travel companions. These gas-free lighters create a small plasma beam that’s safer than butane to use and more environmentally friendly. It creates a super-hot, splashproof flame so you can get a campfire going, or have a smoke […]
If you don’t want to get stuck footing the bill for a hit and run, this dashboard-mounted camera offers up to 2K resolution to make sure you always have a reliable witness, and it’s available in the Boing Boing Store for 30% off it’s usual price.The PapaGo mounts unobtrusively to your windshield to see everything […]
While some people still maintain that everything in Apple’s walled garden “just works” and is immune to the rampant malware of the Windows world, the reality is different. The Mac’s growing market share has made it a much more viable target for malicious actors, and its built-in tools aren’t always enough to fix things. Drive […]