Advertisement
Guest User

TRG - th3j35t3r & talkopen.info - 5/31/2012

a guest
May 31st, 2012
1,087
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.85 KB | None | 0 0
  1. -----BEGIN PGP SIGNED MESSAGE-----
  2. Hash: RIPEMD160
  3.  
  4. We have detected some oddities in th3j35t3r's behavior patterns. Let us explore this below.
  5.  
  6.  
  7. ~ #jester i2p log 5/31/2012 ~
  8.  
  9. <@WvuSoldier> http://talkopen.info/ <--where he wants everyone to go to
  10. <@th3j35t3r> psi, not anymore, think I may have boosted i2p awareness just a little. ;-)
  11. < psi> either way i doubt that the userbase of anonymous is thrifty enough to hop on here
  12. < psi> (i am just very cynical)
  13. <@th3j35t3r> indeed.
  14. <@th3j35t3r> WvuSoldier, so Doxcak3 has been turned and thats a freakin honeypot. Or there's something in it for him.
  15. <@th3j35t3r> remember he has been away. and we know what happens when folks vanish and reappear.
  16. <@WvuSoldier> yeah that is my immediate thoughts as well
  17. <@th3j35t3r> but then he's not exactly influential with his 104 followers.
  18. - -!- Irvysan [Irvy@irc2p] has joined #jester
  19. <@WvuSoldier> who comes back after months and then immediately starts pitching a new "privacy" bit?
  20. - -!- eiluysef [nothing@irc2p] has joined #jester
  21. <@WvuSoldier> Looking around talkopen there are some big names here
  22. <@WvuSoldier> the PLF, MotorSec, Cher, MissAnonFatale
  23. <@WvuSoldier> a little over 200 people in all
  24. <@WvuSoldier> all of them Anon
  25. - -!- j0800 [j0800@irc2p] has joined #jester
  26. - -!- spudboy [dghewlkajd@irc2p] has joined #jester
  27. - -!- blacknyte [blacknyte@irc2p] has joined #jester
  28. * trh agrees with psi
  29. - -!- trh is now known as Anon-Assassin
  30. <@th3j35t3r> WvuSoldier, oh dear talkopen.info is experiencing difficulties
  31. <@th3j35t3r> domain register 29th March 2012
  32. <@WvuSoldier> lol
  33. <@th3j35t3r> *registered
  34.  
  35. ~ #jester i2p log 5/31/2012 ~
  36.  
  37.  
  38. It appears th3j35t3r finds it amusing as well as we do at the TRG that he got caught claiming TANGO DOWN on expired/TOSed domains.
  39.  
  40.  
  41. ~ @th3j35t3r tweets 5/31/2012 ~
  42.  
  43. Tweet: #opMigrate Additionally provider @unshadowed has only 2 servers. 1 which hosts 'talkopen.info' + his own site + the 39 others & NS1. #fail
  44. Link: http://twitter.com/th3j35t3r/status/208158221167374336
  45.  
  46. Tweet: #opMigrate asks Anons 2 migrate 2 'talkopen.info', claims no logging etc on shared box w/41 others, in US, 2 which they have no root? #fail.
  47. Link: http://twitter.com/th3j35t3r/status/208156257473937408
  48.  
  49. ~ @th3j35t3r tweets 5/31/2012 ~
  50.  
  51.  
  52. So we ask, why is th3j35t3r preventing LEO from catching Anonymous Members by tango downing talkopen.info? This seems to contradict everything he has stood for in attacking Anonymous, call them criminals, stealing of private info, and just how horrible Anonymous is.
  53.  
  54. Let us look at two quotes from http://th3j35t3r.wordpress.com/2012/03/09/curiosity-pwned-the-cat/ to give a recent example:
  55.  
  56. "I also had a list of ‘targets’ - twitter usernames I was interested in, these were comprised of usernames of: [...] * Anonymous Members * Lulz/Antisec Members"
  57.  
  58. "This was a Proof of Concept QR-Code based operation against known bad guys, the same bad guys that leak YOUR information, steal YOUR CC nums, and engage in terror plots around the world."
  59.  
  60. We find this interesting,
  61. TRG
  62. -----BEGIN PGP SIGNATURE-----
  63. Version: GnuPG v2.0.17 (MingW32)
  64.  
  65. iQIcBAEBAwAGBQJPx4YPAAoJEFydt9HxKF6qTycP/34MbYxHmPVDviXwvStZFYbr
  66. t22KNIV4nO5OseuopJlfBBlrwbuDb9hYaFsoT2eFSGOC9UTAiy701ovVTw+QSsol
  67. nFpAk8E9msTqhL8XTpEcH61zxBq6C4PJUmMsu6rb1YVopJF4uRkENkkudQONIp59
  68. yifbplw1TRvFvCvVPSqf+gMuAiWlKsKn0fbz2JPorEuxHxs3hGtoiHZ2eNZn+Wod
  69. BdC0iBlZ0JBVRxNyQQbiAP4Imcj5ekdxCmPh+zCfKEcskw5BWNjcsrNPN6yxVC9d
  70. EoYiN9fxVKPgHsKNRzVM1OhrD5bQrknNRHvbfpfSYsOfXBkDilHb0gAXJBPZz/sZ
  71. l5R37WqEebSF6sIlssiVXdhg7CL4/CqqalPb4K+qXFCRRdtBQV2UminWS7DDznKm
  72. KMFGgfrS3gv/THKb9vOfq2PGaUsI+M6I48+eJ19W8uiE/A1Jc0XQClmBuhY7V6A3
  73. HQlllzIZ8Z9rwh99TF9xvLay32dW1KPPiHBLD/dJILumaec2BqbAhJVK4sqFHwoH
  74. gXWtyOLTW8nL+kv/FEJ+Rfcv8RymAV908qJzFf8JeDJAb1o4waQr91O6D94Or8/a
  75. jrf3Z08s3sfmu20jH0wBw6YuL/aSdB3C4SixiUM/jkvAwdMeLBuhFFNQAlqefwAa
  76. nSS/b8Y5EopfHHjGjRV8
  77. =RXtm
  78. -----END PGP SIGNATURE-----
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement