You can login if you already have an account or register by clicking the button below.
Registering is free and all you need is a username and password. We never ask you for your e-mail.
[–]FeathersMcGraw0 points
40 points
40 points
(+40|-0)
ago
(edited ago)
Hmm, yes, can confirm that screenshot. And the website which is capturing everyone's IP address is http://www.henley-putnam.edu/ - which bills itself as "Henley-Putnam University - Intelligence, Counterterrorism, Protection". Oops.
Browse the site map at http://www.henley-putnam.edu/site-map.aspx. A long list of faculty bios, anyone recognise any names? Plus a full book of alphabet soup - NSA, CIA, FBI etc. Have fun.
Seems plausible, it's quite possible to detect archive.is by probing browser features, I do this with ceddit to use a more reddit-like style when archived.
This was found back at the beginning of Gamergate so it has been this way for a long time. We never got a detailed explanation, but the assumption is that archive.is is hosted at Henley Putnam and this is a fail state.
I noticed this yesterday when opening an archive link, request policy blocked the whole page. Didn't think much of it and backed out. Less concening but link here calls some beacon script from mail.ru !!DO NOT CLICK IF YOU HAVE JAVASCRIPT!! hxxps://archive_is/72f3y
Actually all the pages seem to call the script, maybe im just being dumb. Makes you wonder because a shitty beacon is pretty weak by it's self, it is the action taken on the data that is interesting. Like booting people who view certain pages. Or the whole ctr-foxacid thing which I don't quite believe.
tl;dr someone found a weakness in the security of archive.is, inserted their own code that made it look like the page wasn't loading, but the page was actually an image hosted at the website of a university that specialises in security. This gave whoever put the image there everyone's IP addresses, because everyone was connecting to their server to download the image from their site.
Sort: Top
[–] FeathersMcGraw 0 points 40 points 40 points (+40|-0) ago (edited ago)
Hmm, yes, can confirm that screenshot. And the website which is capturing everyone's IP address is http://www.henley-putnam.edu/ - which bills itself as "Henley-Putnam University - Intelligence, Counterterrorism, Protection". Oops.
Browse the site map at http://www.henley-putnam.edu/site-map.aspx. A long list of faculty bios, anyone recognise any names? Plus a full book of alphabet soup - NSA, CIA, FBI etc. Have fun.
Edit: for the lulz, that site map at archive.is: https://archive.is/oZha8
[–] Sciency 1 point 15 points 16 points (+16|-1) ago
I tried to twig people onto this as well.
https://voat.co/v/Conspiracy/1368621
All these free speech websites seem to have US agency ties. Im just glad to see people realizing.
[–] cointelpro_shill 1 point 11 points 12 points (+12|-1) ago
THIS IS A HONEYPOT COMMENT
[–] 8_billion_eaters 1 point 11 points 12 points (+12|-1) ago
Well that's great, man. That's just great. Now what are we going to do?
[–] Fagtardicus 0 points 14 points 14 points (+14|-0) ago (edited ago)
VPN up
edit: spam honeypot archives on normie sites to corrupt their data. label it as porn or some shit
[–] 8_billion_eaters 1 point 9 points 10 points (+10|-1) ago
I was expecting you to say...."build a campfire...maybe we can all just sit around and sing."
[–] go1dfish 0 points 8 points 8 points (+8|-0) ago
Seems plausible, it's quite possible to detect archive.is by probing browser features, I do this with ceddit to use a more reddit-like style when archived.
[–] Arrvee 0 points 6 points 6 points (+6|-0) ago
This was found back at the beginning of Gamergate so it has been this way for a long time. We never got a detailed explanation, but the assumption is that archive.is is hosted at Henley Putnam and this is a fail state.
[–] Womb_Raider ago
We should reach out to the people who run archive.is and get clarity.
[–] ShounanBat 0 points 6 points 6 points (+6|-0) ago
I noticed this yesterday when opening an archive link, request policy blocked the whole page. Didn't think much of it and backed out. Less concening but link here calls some beacon script from mail.ru !!DO NOT CLICK IF YOU HAVE JAVASCRIPT!! hxxps://archive_is/72f3y
[–] ShounanBat 0 points 2 points 2 points (+2|-0) ago
Actually all the pages seem to call the script, maybe im just being dumb. Makes you wonder because a shitty beacon is pretty weak by it's self, it is the action taken on the data that is interesting. Like booting people who view certain pages. Or the whole ctr-foxacid thing which I don't quite believe.
[–] FeathersMcGraw 0 points 5 points 5 points (+5|-0) ago
Okay archive.is is back up. Looking forward to hearing what that was all about.
[–] New_years_day 0 points 5 points 5 points (+5|-0) ago
Compromised how?
[–] PM_ME_YOUR_ARCHES 0 points 15 points 15 points (+15|-0) ago (edited ago)
tl;dr someone found a weakness in the security of archive.is, inserted their own code that made it look like the page wasn't loading, but the page was actually an image hosted at the website of a university that specialises in security. This gave whoever put the image there everyone's IP addresses, because everyone was connecting to their server to download the image from their site.
[–] New_years_day 0 points 2 points 2 points (+2|-0) ago
Thank you for taking the time to type that out.
[–] [deleted] 3 points 5 points 8 points (+8|-3) ago
[–] 6718963? 0 points 3 points 3 points (+3|-0) ago
Welp. Looks like I got honey potted. Is this some stupid exercise from said US backed quasi-intelligence school? A psyops against us?