• Help, We've Been Hacked!

    From Hackers Anonymous@noreply@oc2mx.net to alt.privacy.anon-server,alt.2600,misc.phone.mobile.iphone on Sat Apr 11 17:44:45 2026
    From Newsgroup: alt.privacy.anon-server

    I'm inspired to fight hackers!

    https://www.youtube.com/watch?v=sOicR2enFsY

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From ReK2 Hispagatos@rek2@usenet_reborn.tui to alt.privacy.anon-server,alt.2600,misc.phone.mobile.iphone on Sun Apr 12 17:03:25 2026
    From Newsgroup: alt.privacy.anon-server

    [in reply to ReK2 Hispagatos <rek2@usenet_reborn.tui>]

    I'm inspired to fight hackers!

    https://www.youtube.com/watch?v=sOicR2enFsY



    hmmm hackers are the good guys, you mean cybercriminals, criminals
    and other rats..
    Most of the software you use is been secure and tested by hackers
    for your protection, same as most research on vulnerabilities
    that get reported to companies and even the browser you are
    using is most likely created and tested, secured by hackers

    the rats that steal old peoples CC's and such are not hackers
    but are rat criminals or part of a criminal organization
    using techniques and knowladge to commit crimes.

    https://hackingisnotacrime.org/

    Happy Hacking
    ReK2
    --
    EfA|rCiryaN+AEfA|EfuNN+AEfA+N+Ari?N+AEfna {gemini,https}://{,rek2.}hispagatos.org - mastodon: @rek2@hispagatos.space [https|gemini]://2600.Madrid - https://hispagatos.space/@rek2
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From noreply@noreply@dirge.harmsk.com to alt.privacy.anon-server on Sun Apr 12 14:59:36 2026
    From Newsgroup: alt.privacy.anon-server

    On Sun, 12 Apr 2026 17:03:25 -0000 (UTC), ReK2 Hispagatos wrote:

    snip

    hmmm hackers are the good guys, you mean cybercriminals, criminals
    and other rats..
    Most of the software you use is been secure and tested by hackers
    for your protection, same as most research on vulnerabilities
    that get reported to companies and even the browser you are
    using is most likely created and tested, secured by hackers
    the rats that steal old peoples CC's and such are not hackers
    but are rat criminals or part of a criminal organization
    using techniques and knowladge to commit crimes. https://hackingisnotacrime.org/
    Happy Hacking
    ReK2

    (using Tor Browser 15.0.9) https://duckduckgo.com/?q=hacker+helpful&ia=web&assist=true
    Hackers can be helpful when they are ethical hackers, also known as white-hat >hackers, who work to identify and fix security vulnerabilities in systems to >protect against malicious attacks. They use their skills to enhance cybersecurity
    for organizations and individuals.
    eccouncil.org amu.apus.edu
    The Role of Ethical Hackers
    What Are Ethical Hackers?
    Ethical hackers, also known as white-hat hackers, are cybersecurity >professionals who use their skills to help organizations identify and fix >security vulnerabilities. Unlike malicious hackers, they operate with permission
    and aim to enhance security rather than exploit weaknesses.
    Benefits of Ethical Hacking
    Ethical hackers provide several key benefits to organizations:
    Vulnerability Identification: They assess systems for weaknesses that could be
    exploited by malicious actors.
    Security Enhancement: By fixing identified vulnerabilities, they help
    strengthen the overall security posture of an organization.
    Compliance Support: They assist organizations in meeting data security
    regulations, such as HIPAA and GDPR.
    Types of Hackers
    Hackers can be categorized based on their intentions and methods:
    Type Description
    White-hat Ethical hackers who help organizations secure their systems. >Black-hat Malicious hackers who exploit vulnerabilities for personal gain.
    Gray-hat Hackers who may violate laws but do not have malicious intent.
    Script kiddies Inexperienced hackers who use existing tools to explore systems.
    Suicide hackers Hackers associated with terrorist or vigilante groups. >Conclusion
    Ethical hackers play a crucial role in cybersecurity by proactively identifying
    and addressing vulnerabilities. Their work is essential for protecting sensitive
    information and maintaining the integrity of systems against potential cyber >threats.
    eccouncil.org umgc.edu
    [end quoted "search assist"]

    i've been using duckduckgo's a.i.-enhanced search assist (safe search: off)
    in tor browser routinely every day ... i find a.i.-assist for the most part helpful, although results tend to be completely dominated by the mainstream narrative, regardless of subject or topic of research ... it's their planet, where the "good guy/bad guy" is universal upon the earth, it's human nature, the human condition, so they invent and propagate idealism e.g. "we went to
    the moon", "jesus saves", as if it were corporeal, they are terrene sapiens that can't seem to change ... hence caricatures, and comic book superheroes:

    https://duckduckgo.com/?q=spy+v+spy+comic&ia=web&assist=true
    Spy vs. Spy is a wordless comic strip published in Mad magazine, created by >Antonio Prohias in 1961. It features two identical spies, one dressed in black >and the other in white, who engage in humorous and chaotic espionage battles >using various booby traps.
    Wikipedia Fandom
    Overview of Spy vs. Spy
    Spy vs. Spy is a wordless comic strip that has been a staple of Mad magazine >since its debut in January 1961. Created by Cuban cartoonist Antonio Prohias, the
    strip features two identical spies engaged in comical espionage battles. One spy
    is dressed in black, while the other is in white, and they are known for their >long, beak-like heads.
    Key Features
    Characters
    Character Description
    Black Spy Dressed in black, often the instigator of conflicts.
    White Spy Dressed in white, frequently counters Black Spy's plans.
    Themes
    Humor and Satire: The comic parodies the political ideologies of the Cold War,
    showcasing the absurdity of espionage.
    Booby Traps: The spies use a variety of traps and gadgets to outsmart each
    other, leading to humorous outcomes.
    Publication History
    Creator: Antonio Prohias (1961iV1987)
    Current Artist: Peter Kuper (1997iVpresent)
    First Appearance: Mad magazine #60 (January 1961)
    Current Status: Ongoing, with a return to regular publication in 2024.
    Adaptations and Media
    Spy vs. Spy has expanded beyond the comic strip into various media, including:
    Television: Animated segments in the Mad TV series and commercials.
    Video Games: Several adaptations for platforms like Xbox and PlayStation.
    Merchandise: Action figures and trading cards featuring the characters.
    This enduring comic strip continues to entertain audiences with its unique blend
    of humor and visual storytelling.
    Wikipedia Internet Archive
    [end quoted "search assist"]

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Your Name@YourName@YourISP.com to misc.phone.mobile.iphone,alt.2600,alt.privacy.anon-server on Mon Apr 13 18:03:09 2026
    From Newsgroup: alt.privacy.anon-server

    On 2026-04-12 17:03:25 +0000, ReK2 Hispagatos said:


    [in reply to ReK2 Hispagatos <rek2@usenet_reborn.tui>]

    I'm inspired to fight hackers!

    https://www.youtube.com/watch?v=sOicR2enFsY



    hmmm hackers are the good guys, you mean cybercriminals, criminals
    and other rats..
    Most of the software you use is been secure and tested by hackers
    for your protection, same as most research on vulnerabilities
    that get reported to companies and even the browser you are
    using is most likely created and tested, secured by hackers

    the rats that steal old peoples CC's and such are not hackers
    but are rat criminals or part of a criminal organization
    using techniques and knowladge to commit crimes.

    https://hackingisnotacrime.org/

    Happy Hacking
    ReK2

    "Hackers" in the tech sense simply means to *anyone* who breaks into
    computers or software code,

    "A hacker breaks into computer systems. There are hackers
    who exploit weak security for malicious intent, and ethical
    hackers who help find vulnerabilities."

    but there are two main sub-groups - "Black Hat Hackers" (the criminals)
    and "White Hat Hackers" (the ones who find and report bugs / security
    holes), named after the traditional hat colours of the bad and good
    guys in old cowboy movies.



    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.privacy.anon-server,alt.2600,misc.phone.mobile.iphone on Thu Apr 16 00:03:08 2026
    From Newsgroup: alt.privacy.anon-server

    Hackers Anonymous said:

    I'm inspired to fight hackers!

    https://www.youtube.com/watch?v=sOicR2enFsY

    You'd never know if you were visited by a true "hacker".

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From ReK2 Hispagatos@rek2@usenet_reborn.tui to misc.phone.mobile.iphone,alt.2600,alt.privacy.anon-server on Fri Apr 17 17:10:56 2026
    From Newsgroup: alt.privacy.anon-server

    [in reply to ReK2 Hispagatos <rek2@usenet_reborn.tui>]

    On 2026-04-12 17:03:25 +0000, ReK2 Hispagatos said:


    [in reply to ReK2 Hispagatos <rek2@usenet_reborn.tui>]

    I'm inspired to fight hackers!

    https://www.youtube.com/watch?v=sOicR2enFsY



    hmmm hackers are the good guys, you mean cybercriminals, criminals
    and other rats..
    Most of the software you use is been secure and tested by hackers
    for your protection, same as most research on vulnerabilities
    that get reported to companies and even the browser you are
    using is most likely created and tested, secured by hackers

    the rats that steal old peoples CC's and such are not hackers
    but are rat criminals or part of a criminal organization
    using techniques and knowladge to commit crimes.

    https://hackingisnotacrime.org/

    Happy Hacking
    ReK2

    "Hackers" in the tech sense simply means to *anyone* who breaks into computers or software code,

    "A hacker breaks into computer systems. There are hackers
    who exploit weak security for malicious intent, and ethical
    hackers who help find vulnerabilities."

    but there are two main sub-groups - "Black Hat Hackers" (the criminals)
    and "White Hat Hackers" (the ones who find and report bugs / security holes), named after the traditional hat colours of the bad and good
    guys in old cowboy movies.

    Hello, good day, I already know your definition and what you pasted, those are mainstraim and wrong popular belief because of bad media and silly movies. Stallman and many Linux hackers do not break into systems and are hackers.
    The white/black hat is a militarized term, and ethical hacking was a way
    for corporate america to say we hired a hacker with out having to
    have people rolling their eyes... did you even read the site I linked?
    It explains it way better than I can, that org is financed by
    many 50-60+ years olds, (like myself) old school hackers and collectives
    that now all work for the same people who calls us ethical hackers and
    white hats, and yes, now **we** are the ones that roll our eyes when someone says that...

    At the end if you going to define something I will go to the roots
    and the people in that culture and personality and not what
    mass media, movies and academia as a result, say but that is just me, of course
    anyone is free to say whatever, I just get concerned when
    people includes me and my peers in a phrase that in reality points to criminals
    because none of the hackers I know are criminals.

    Have a good weekend.

    Happy Hacking
    ReK2

    --
    EfA|rCiryaN+AEfA|EfuNN+AEfA+N+Ari?N+AEfna {gemini,https}://{,rek2.}hispagatos.org - mastodon: @rek2@hispagatos.space [https|gemini]://2600.Madrid - https://hispagatos.space/@rek2
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202604.rodent.frell.theremailer.net to alt.2600,alt.privacy.anon-server,misc.phone.mobile.iphone on Mon Apr 20 20:50:33 2026
    From Newsgroup: alt.privacy.anon-server

    "Hackers" in the tech sense simply means to *anyone* who breaks into
    computers or software code,

    "A hacker breaks into computer systems. There are hackers
    who exploit weak security for malicious intent, and ethical
    hackers who help find vulnerabilities."

    but there are two main sub-groups - "Black Hat Hackers" (the
    criminals) and "White Hat Hackers" (the ones who find and report bugs / security holes), named after the traditional hat colours of the bad and
    good guys in old cowboy movies.

    In the 1800s in California, some bad guys robbed a town bank there.
    A posse was gathered and they went after the crooks. They tracked them
    down near two mountains. During the gun fight, the sheriff was killed
    and one of the crooks was killed. One of the two mountains was then
    named White Hat Mountain after the sheriff and the other was named
    Black Hat Mountain after the slain crook.
    True story.

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.2600,alt.privacy.anon-server,misc.phone.mobile.iphone on Tue Apr 21 03:49:58 2026
    From Newsgroup: alt.privacy.anon-server

    On 20 Apr 2026, Fritz Wuehler <fritz@spamexpire- 202604.rodent.frell.theremailer.net> posted some news:20260420.205033.f85a59a0@msgid.frell.theremailer.net:

    "Hackers" in the tech sense simply means to *anyone* who breaks into
    computers or software code,

    "A hacker breaks into computer systems. There are hackers
    who exploit weak security for malicious intent, and ethical
    hackers who help find vulnerabilities."

    but there are two main sub-groups - "Black Hat Hackers" (the
    criminals) and "White Hat Hackers" (the ones who find and report bugs / security holes), named after the traditional hat colours of the bad and
    good guys in old cowboy movies.

    In the 1800s in California, some bad guys robbed a town bank there.
    A posse was gathered and they went after the crooks. They tracked them
    down near two mountains. During the gun fight, the sheriff was killed
    and one of the crooks was killed. One of the two mountains was then
    named White Hat Mountain after the sheriff and the other was named
    Black Hat Mountain after the slain crook.
    True story.

    don't leave incrminating evidence

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From ReK2 Hispagatos@rek2@usenet_reborn.tui to alt.2600,alt.privacy.anon-server,misc.phone.mobile.iphone on Tue Apr 21 16:55:33 2026
    From Newsgroup: alt.privacy.anon-server

    [in reply to ReK2 Hispagatos <rek2@usenet_reborn.tui>]

    On 20 Apr 2026, Fritz Wuehler <fritz@spamexpire- 202604.rodent.frell.theremailer.net> posted some news:20260420.205033.f85a59a0@msgid.frell.theremailer.net:

    "Hackers" in the tech sense simply means to *anyone* who breaks into
    computers or software code,

    "A hacker breaks into computer systems. There are hackers
    who exploit weak security for malicious intent, and ethical
    hackers who help find vulnerabilities."

    but there are two main sub-groups - "Black Hat Hackers" (the
    criminals) and "White Hat Hackers" (the ones who find and report bugs / security holes), named after the traditional hat colours of the bad and good guys in old cowboy movies.

    In the 1800s in California, some bad guys robbed a town bank there.
    A posse was gathered and they went after the crooks. They tracked them down near two mountains. During the gun fight, the sheriff was killed
    and one of the crooks was killed. One of the two mountains was then
    named White Hat Mountain after the sheriff and the other was named
    Black Hat Mountain after the slain crook.
    True story.

    don't leave incrminating evidence



    LOL :)

    Happy Hacking
    ReK2
    --
    EfA|rCiryaN+AEfA|EfuNN+AEfA+N+Ari?N+AEfna {gemini,https}://{,rek2.}hispagatos.org - mastodon: @rek2@hispagatos.space [https|gemini]://2600.Madrid - https://hispagatos.space/@rek2
    --- Synchronet 3.21f-Linux NewsLink 1.2