Editing Talk:2388: Viral Quiz Identity Theft
Please sign your posts with ~~~~ |
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 12: | Line 12: | ||
I understand that the second part has to do with a strategy for doxing, which is fine, but why would it be appendaged to White Hat's strategy like that (and especially with an 'even though')? The entire paragraph following is just a description of how one could use this to attack the participant, but the whole point of the comic was to show that a brief Google search could give you the same results. If anyone could clear that up, it would be helpful. [[User:BlackHat|BlackHat]] ([[User talk:BlackHat|talk]]) 13:44, 22 November 2020 (UTC) | I understand that the second part has to do with a strategy for doxing, which is fine, but why would it be appendaged to White Hat's strategy like that (and especially with an 'even though')? The entire paragraph following is just a description of how one could use this to attack the participant, but the whole point of the comic was to show that a brief Google search could give you the same results. If anyone could clear that up, it would be helpful. [[User:BlackHat|BlackHat]] ([[User talk:BlackHat|talk]]) 13:44, 22 November 2020 (UTC) | ||
: As you mentioned, White Hat's basic argument is there are already public databases of names and addresses. If that's all the information Hairy needs, then Hairy's more elaborate scheme is unnecessary. The quote you mention is a counterargument to White Hat's point: If Hairy is actually trying to steal the identity of some *specific* online users and all Hairy knows is a pseudonymous username like e.g. turnitup91, then Hairy can't find out anything more about them from the public databases alone. Hairy's more elaborate scheme may actually make sense in such a case. | : As you mentioned, White Hat's basic argument is there are already public databases of names and addresses. If that's all the information Hairy needs, then Hairy's more elaborate scheme is unnecessary. The quote you mention is a counterargument to White Hat's point: If Hairy is actually trying to steal the identity of some *specific* online users and all Hairy knows is a pseudonymous username like e.g. turnitup91, then Hairy can't find out anything more about them from the public databases alone. Hairy's more elaborate scheme may actually make sense in such a case. | ||
− | |||
: | : | ||
: And that's the purpose of the quote: Even though White Hat is correct about the public databases, that's not enough if you're trying to de-anonymize someone specific and all you have is a pseudonym. [[User:Gertuviti|Gertuviti]] ([[User talk:Gertuviti|talk]]) 15:53, 22 November 2020 (UTC) | : And that's the purpose of the quote: Even though White Hat is correct about the public databases, that's not enough if you're trying to de-anonymize someone specific and all you have is a pseudonym. [[User:Gertuviti|Gertuviti]] ([[User talk:Gertuviti|talk]]) 15:53, 22 November 2020 (UTC) |