IMPORTANT

Read below for more information!
1663549446903.png

Last night KiwiFarms was hit with a breach of their website. User information has been likely gathered. The true impact of this has not been seen yet. As a general guideline NEVER click a link to something unless you KNOW what it goes to. Also PLEASE review your information. As I say in the link below I have done everything I can think of to secure your information but you need to be aware and like take the steps you can to like keep yourself safe. I am also including the link Josh gave. I am VERY tempted to scrub IPs from the site although I believe they should all lead to the firewall datacenter and not to you all. If you have an account make sure it is WHOLEY unique to the site and is not used by ANYTHING ELSE linking to you. If you have used a personal email I STRONGLY suggest you change it. If you can't then reach out to staff and we will. Same for passwords. STRONGLY suggest getting Bitwarden and making a unique long password and saving it since those are saved locally and encrypted so if you forget you can simply unlock BW and see your username and password. Free VPNs are all over. Get one! This should be SOP for ANYONE shitposting in the cancelculture world. We had a small staff meeting today over another issue and I will be addressing that later tonight or tomorrow but for now this needs your complete attention and you need to be proactive.


 
Right as I thought this was tame, then this shit happens. October's going to be interesting.
 
I just want to reiterate what @ItsJustMayaC said before with security, specifically cybersecurity.
I'd recommend anybody go to the hackforums and read up on their board for CS. They provide resources, tips, and sometimes free software that could be used to protect yourself.
If you have the time and autism to figure out your OS, it will be useful one day. Just recently, I caught someone going into my computer using Powershell. They disabled my antivirus and possibly tried to put a keylogger in my shit. It can be very serious when you have people like this.
The internet's a fucking joke until you get the point of gayop bullshit, and we need to get ready because this storm is still raging.
 
Sounds like you got something planned out. I'm a bit excited now.
No so much a plan as we just have detectors out there. The OG metokur forums were a troll playground where people joined and caused chaos in different communities under different names. Lets just say my posting about a possible attack and the risk of web breaches last week wasn't a coincidence. I personally wish we had more people getting info from the keffals corner rather than slow anon leaks to my email.
 
*Old drunken black man voice* THEYZ PLAYIN' A Dangerous Game Out Yhear in deez skreets peoplez!
 
I got all my eyes on Keffals popped and banned rn or I would offer to help, had to move everyone back to internal conflicts due to dumbasses not doing their homework ever.
 
Read below for more information!
View attachment 2378

Last night KiwiFarms was hit with a breach of their website. User information has been likely gathered. The true impact of this has not been seen yet. As a general guideline NEVER click a link to something unless you KNOW what it goes to. Also PLEASE review your information. As I say in the link below I have done everything I can think of to secure your information but you need to be aware and like take the steps you can to like keep yourself safe. I am also including the link Josh gave. I am VERY tempted to scrub IPs from the site although I believe they should all lead to the firewall datacenter and not to you all. If you have an account make sure it is WHOLEY unique to the site and is not used by ANYTHING ELSE linking to you. If you have used a personal email I STRONGLY suggest you change it. If you can't then reach out to staff and we will. Same for passwords. STRONGLY suggest getting Bitwarden and making a unique long password and saving it since those are saved locally and encrypted so if you forget you can simply unlock BW and see your username and password. Free VPNs are all over. Get one! This should be SOP for ANYONE shitposting in the cancelculture world. We had a small staff meeting today over another issue and I will be addressing that later tonight or tomorrow but for now this needs your complete attention and you need to be proactive.


A truck load of shit just hit a very large fan.
 
Did Josh sell out? That's the talking point now........
I doubt it. He probably got cat Phished to some degree or something. He wouldn't admit to it either cause it was a troon ;) I like that narrative better and my evidence of it being true is that it's funny.
 
On the real he got hacked in the way I described months ago, brute fished a password, made a random account admin and fucked the whole thing up.
Man just like super weird coincidence huh?
Jester_bow.png
 
Some brief password management advice: Use keepass and any of myriad cloud services available to sync it up. There is support via plugins to autosync or you can just put your shared DBs into a sync folder. Keep device specific and activity specific DBs. You don't need everything in one file. Use a file and a password to lock/unlock your DBs. Commercial cloud based password services do not give you direct control of where and when your stored passwords are accessible. This method does. A breach at lastpass carries the risk that your passwords were somehow revealed by a stupid database query. Using keepass means the passwords are only ever revealed in the clear locally. There are several compatible password managers for mobile that round out password management. Keepass2Android is a good choice for Android. A new phone is a good choice for Apple.
 
Some brief password management advice: Use keepass and any of myriad cloud services available to sync it up. There is support via plugins to autosync or you can just put your shared DBs into a sync folder. Keep device specific and activity specific DBs. You don't need everything in one file. Use a file and a password to lock/unlock your DBs. Commercial cloud based password services do not give you direct control of where and when your stored passwords are accessible. This method does. A breach at lastpass carries the risk that your passwords were somehow revealed by a stupid database query. Using keepass means the passwords are only ever revealed in the clear locally. There are several compatible password managers for mobile that round out password management. Keepass2Android is a good choice for Android. A new phone is a good choice for Apple.
Eh Apple not as good as everyone thinks. Like Apple literally sends a record of all your encrypted data to china. I don't trust them. I don't trust android either. I been using Bitwarden on my android. I was using lastpass but they made it 1 device free and multi was paid so I fked off. Also keep ass lol
 
Eh Apple not as good as everyone thinks. Like Apple literally sends a record of all your encrypted data to china. I don't trust them. I don't trust android either. I been using Bitwarden on my android. I was using lastpass but they made it 1 device free and multi was paid so I fked off. Also keep ass lol
Ya, fApple is cancer. The biggest reason to use keepass (I chuckle every time I type it out too) is that everything is on your end of things. If a data breach happens with whichever service you use to sync things then the database is still fully encrypted. The only time you can access the passwords is when the database is on your device. Keeping everything client side means nobody can (reasonably) breach that security circle unless they already own your device. That it is FOSS is more of a bonus after those security concerns. You can alter and recompile it at your leisure. There are also a ton of plugins that are (usually) well maintained.

Bitwarden looks good and it is FOSS as well. It doesn't have the option to use other services to sync and this is a major drawback. You can either use their cloud, run your own docker using their software on your device or your hosted service, or use is standalone and hack together some way to manually sync things. This is fine for most people and most typical use cases. That lack of versatility and portability is crippling if there is a 0day for their server side software or the exchange protocol when syncing. This isn't a reason to jump ship if it is working for you, but it is a vulnerability (a single point of failure) that you should be aware of when doing cost/benefit.
 
Back
Top