0
40

[–] FeathersMcGraw 0 points 40 points (+40|-0) ago  (edited ago)

Hmm, yes, can confirm that screenshot. And the website which is capturing everyone's IP address is http://www.henley-putnam.edu/ - which bills itself as "Henley-Putnam University - Intelligence, Counterterrorism, Protection". Oops.

Browse the site map at http://www.henley-putnam.edu/site-map.aspx. A long list of faculty bios, anyone recognise any names? Plus a full book of alphabet soup - NSA, CIA, FBI etc. Have fun.

Edit: for the lulz, that site map at archive.is: https://archive.is/oZha8

1
15

[–] Sciency 1 points 15 points (+16|-1) ago 

I tried to twig people onto this as well.

https://voat.co/v/Conspiracy/1368621

All these free speech websites seem to have US agency ties. Im just glad to see people realizing.

1
11

[–] cointelpro_shill 1 points 11 points (+12|-1) ago 

THIS IS A HONEYPOT COMMENT

1
11

[–] 8_billion_eaters 1 points 11 points (+12|-1) ago 

Well that's great, man. That's just great. Now what are we going to do?

0
14

[–] Fagtardicus 0 points 14 points (+14|-0) ago  (edited ago)

VPN up

edit: spam honeypot archives on normie sites to corrupt their data. label it as porn or some shit

1
9

[–] 8_billion_eaters 1 points 9 points (+10|-1) ago 

I was expecting you to say...."build a campfire...maybe we can all just sit around and sing."

0
8

[–] go1dfish 0 points 8 points (+8|-0) ago 

Seems plausible, it's quite possible to detect archive.is by probing browser features, I do this with ceddit to use a more reddit-like style when archived.

0
6

[–] Arrvee 0 points 6 points (+6|-0) ago 

This was found back at the beginning of Gamergate so it has been this way for a long time. We never got a detailed explanation, but the assumption is that archive.is is hosted at Henley Putnam and this is a fail state.

0
0

[–] Womb_Raider 0 points 0 points (+0|-0) ago 

We should reach out to the people who run archive.is and get clarity.

0
6

[–] ShounanBat 0 points 6 points (+6|-0) ago 

I noticed this yesterday when opening an archive link, request policy blocked the whole page. Didn't think much of it and backed out. Less concening but link here calls some beacon script from mail.ru !!DO NOT CLICK IF YOU HAVE JAVASCRIPT!! hxxps://archive_is/72f3y

0
2

[–] ShounanBat 0 points 2 points (+2|-0) ago 

Actually all the pages seem to call the script, maybe im just being dumb. Makes you wonder because a shitty beacon is pretty weak by it's self, it is the action taken on the data that is interesting. Like booting people who view certain pages. Or the whole ctr-foxacid thing which I don't quite believe.

0
5

[–] FeathersMcGraw 0 points 5 points (+5|-0) ago 

Okay archive.is is back up. Looking forward to hearing what that was all about.

0
5

[–] New_years_day 0 points 5 points (+5|-0) ago 

Compromised how?

0
15

[–] PM_ME_YOUR_ARCHES 0 points 15 points (+15|-0) ago  (edited ago)

tl;dr someone found a weakness in the security of archive.is, inserted their own code that made it look like the page wasn't loading, but the page was actually an image hosted at the website of a university that specialises in security. This gave whoever put the image there everyone's IP addresses, because everyone was connecting to their server to download the image from their site.

0
2

[–] New_years_day 0 points 2 points (+2|-0) ago 

Thank you for taking the time to type that out.

3
5

[–] Alopix 3 points 5 points (+8|-3) ago 

if you READ the information presented, the claim is that an exploit has been found to de-anonymize users viewing pages archived by archive.is

10
-6

0
3

[–] 6718963? 0 points 3 points (+3|-0) ago 

Welp. Looks like I got honey potted. Is this some stupid exercise from said US backed quasi-intelligence school? A psyops against us?

load more comments ▼ (7 remaining)