Eric Radulovic, an Indiana man associated with AntiFA terrorist groups is accused of infiltrating Alt-right forums and threatening to kill attendees at Alt-right free speech events under the sperglord theory that "the movement needs martyrs". Radulovic's sperglord posts included the caveat that:
it's a false flag for sure, but I'll be aiming for the more tanned, dark-haired muddied jeans in the crowd so real whites won't have to worry.
At this point is is safe presume the "anon" personhood fandom forums have all degraded to the point every participant is at least three false flags away from themselves.
The Big Botnet made from small routers is bigger than initially though and comprised of a far wider range of router models than initially disclosed (archived).
Microsoft announced it is acquiring Github in exchange for Microsoft stock. Microsoft vice president Nat Friedman will be in charge of Github's operations.
Outrage over the arrest of English leader Tony Robinson continues after a British court sentenced the Englishman to 13 months in prison for "contempt of court" and further issued an order banning media from reporting on the arrest and sentencing (archived). In the wake of the court order articles covering Robinson's initial arrest began disappearing from publications ranging from British newspaper the Mirror to US based Breitbart media.
The court imposed restrictions on reporting the case were eventually lifted. In its reporting that the court lifted its blackout, Breitbart has failed to apologize or explain why they aided and comforted the terrorist regime in the United Kingdom (archived).
The worthless Forkcoin known as "Bitcoin Gold" is even more worthless having been hit by double spending and 51% attacks demonstrating that its deviant blockchain lacks sufficient interest and value to attract sufficient mining activity. Much like the Roger Ver-ified "Bitcoin Cash" Forkcoin, "Bitcoin Gold" was split from the Bitcoin Blockchain via hardfork by a marginal crew with odd politics and like "Bitcoin Cash" failed to attract sufficient serious interest to matter.
The hill on which the "Bitcoin Gold" crew chose to die was changing the mining algorithm to a GPU mining friendly memory hard algorithm of recent publication dubbed "equihash" leaving their blockchain's security to the mercy of altcoin miners with GPU farms and no particular loyalty to any of the non-Bitcoin blockchains they mine. The meteorological risk of circumstances aligning to make these attacks the natural, economically rational choice for miners looms over every purported "cryptocurrency" blockchain that fails to attract sufficient value to actually be Bitcoin.
A great many types of vulnerability-by-design in consumer routers have been public for a rather long time: Linksys, MikroTik, NETGEAR, TP-Link, and other vendors, have — for the entire history of this product type — been selling boxes that are, essentially, public toilets, free for the remote taking by any reasonably-intelligent teenager.
It appears that this "news" has finally percolated down through the drains and into the dark cellars where USG gendarmerie dwell. As part of their regular work to force the replacement of systems containing old, burned NSA-authored vulnerabilities, with new and fresh ones — USG.FBI have recently turned their attention to consumer routers.
The lively petri dish of self-propagating shitware now commonly known to be dwelling in the NSA victims' home routers, has been officially blamed on Putin's omnipotent DNC-diddling brigade. Respectable, non-terrorist USG subjects will, presumably, be issued new, "clean" routers, in the nearest future.
The burning of these vulnerabilities was handled by having "researchers" affiliated with Cisco unveil the presence of a botnet populated by ~500,000 small routers commandeered by an artful piece of malware which persists across device reboots (archived). Meanwhile, Cisco continues having its own profound and self-inflicted security issues.
A member of the US embassy staff in China has reported to have suffered a "mild brain injury" after experiencing a abnormal sound. Similar incidents in Cuba lead the US to depopulate its diplomatic mission in that country. That these incidents keep happening in US embassies raises the possibility that various surveillance and electronic warfare equipment maintained by the US empire in its embassies has adverse effects on human health.
Yet another vulnerability baked into the "speculative execution" optimizations bundled with many contemporary CPUs has been documented (archived). Expect this trend to continue well into the future.
In the latest round of Cisco patches, the known USG.NSA collaborators included a patch for "CVE-2018-0222" a intentionally placed yet undocumented administrator account with fixed credentials in Cisco's Digital Network Architecture Center (archived).
Today disclosure of two plaintext leaking behaviors in email clients handling OpenPGP and S/MIME encrypted messages has been released (archived). The vulnerability affecting S/MIME is baked into the S/MIME standard and may only be mitigated by abandoning S/MIME, no other mitigation is possible. Meanwhile the plaintext leaking behavior affecting OpenPGP encrypted emails requires certain common but very stupid behavior on the part of an email client and the user allowing the email client to be involved in decrypting the message.
The attack in OpenPGP encrypted email involves the message being molested on the wire in such a way the plaintext metadata surrounding the cyphertext is modified to engage your typical email client's HTML rendering engine. If the email client is allowed to be involved in decrypting the cyphertext as is common with various client "plugins", the email client can "phone home" the plaintext after decryption to the message's molester according to the spurious instructions delivered to the HTML rendering engine. The mitigation for this vulnerability is hygiene and not allowing your email client to be involved in cryptographic operations beyond sending and recieving cyphertext blobs encrypted and decrypted elsewhere.