Did the Throwaway Account Genocide really happen?

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account

Cringe newfag

kiwifarms.net
Joined
Feb 23, 2022
So I have always been taught this as some unquestionable truth, but I'm not buying it.

Six thousand users? (or is it sixty thousand? The numbers keep changing) I mean really? And what would be the motive? Why would Null, when Kiwifarms was supposedly in such dire straits, dedicate time and resources to booting potentially productive users who might be contributing BAT micro-tokens? It just doesn't add up.

Has there been any actual historical research done on this? Or are we supposed to just take it on faith.

Just help me understand this Kiwibros.
 
Solution
The math just doesn't add up. You're telling me one person was able to delete thousands of accounts in a matter of minutes?
I built a replica forum to test this theory, and I can only delete like 5 per minute.
Null considered passwords compromised as a safety measure from the hack, and forced everyone to reset passwords. If you were that retarded and used a throwaway email for your account, you got fucked.

Many accounts were apparently that retarded.
 
I always thought Null had said to use a throwaway email for your account. I'm lucky that the Lolcow mail still works even though searching any of the sites like autism.exposed still brings up the retarded Cloudflare message.
 
Null considered passwords compromised as a safety measure from the hack, and forced everyone to reset passwords. If you were that retarded and used a throwaway email for your account, you got fucked.

Many accounts were apparently that retarded.
The hack that he himself claimed did not succeed at stealing any data?

Can you keep the narrative from contradicting itself for even one second? Really?
 
The hack that he himself claimed did not succeed at stealing any data?

Can you keep the narrative from contradicting itself for even one second? Really?
It's a safety measure every site does whenever a hack occurs. They tell you to reset your password in case of compromise, even if compromise did not actually occur. It just so happens, the password reset involves email and this fucked people over. Null said to assume your email, password, and ip address were exposed on the telegram.

Consider it a wake-up call for practicing better web hygiene now that we know how far trannies are willing to go to take down those who disagree with them. Niggas should be using a proxy/vpn and a password manager anyway.
 
Can you keep the narrative from contradicting itself for even one second? Really?
It's contradicting because you're a twitter schizo leaping to conclusions without any logic to it. I'm not @Null, but I'd guess the intuition for password reset is:

1. Gets rid of sleeper socks that are most likely to false flag. Those are far more likely to use temp email.
2. There are brute force login attempts, those serve dual purpose as L7 DoS too - login is a heavy operation in XF. Shitton of people reuse passwords, forced reset significantly reduces chance of bruteforce succeeding.
3. Suppose the db got dumped, and somebody is keeping it under the wraps because they're cracking password hashes which can take weeks to months, depending on how much money they're willing to throw at AWS GPU instances. If that's the case, the forced reset instantly renders the db useless. Meaning the password reset significantly heightens chance to publish/sell the db, which didn't happen so far. Ie the reset itself actually *raises* confidence in that the db didn't leak.
 
Primary reason was to stop broken accounts from being used, and from accounts with weak passwords from being broken into and used. The account which uploaded the .opus file was a real account recently used and the opus was uploaded as an attachment to an existing post the hacker didn't make.

OP is a shit stirrer btw.
 
I was one for the retards that used a disposable email address, however, I wrote down the entire email address, plus the site that hosted that email address. I had no problems resetting my password. For the time being, I will keep the email address until I decide on an alternative email address.
 
Back
Top Bottom