Ecoer Logo
VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS0.00%
Net Worth
0.286USD
STEEM
0.000STEEM
SBD
0.000SBD
Own SP
5.290SP

Detailed Balance

STEEM
balance
0.000STEEM
market_balance
0.000STEEM
savings_balance
0.000STEEM
reward_steem_balance
0.000STEEM
STEEM POWER
Own SP
5.290SP
Delegated Out
0.000SP
Delegation In
0.000SP
Effective Power
5.290SP
Reward SP (pending)
0.000SP
SBD
sbd_balance
0.000SBD
sbd_conversions
0.000SBD
sbd_market_balance
0.000SBD
savings_sbd_balance
0.000SBD
reward_sbd_balance
0.000SBD
{
  "balance": "0.000 STEEM",
  "savings_balance": "0.000 STEEM",
  "reward_steem_balance": "0.000 STEEM",
  "vesting_shares": "8613.879420 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "sbd_balance": "0.000 SBD",
  "savings_sbd_balance": "0.000 SBD",
  "reward_sbd_balance": "0.000 SBD",
  "conversions": []
}

Account Info

nameavalerion
id1157835
rank214,994
reputation655347458
created2018-10-19T11:21:00
recovery_accountblocktrades
proxyNone
post_count14
comment_count0
lifetime_vote_count0
witnesses_voted_for0
last_post2018-12-08T09:00:30
last_root_post2018-12-08T09:00:30
last_vote_time2018-12-08T09:00:30
proxied_vsf_votes0, 0, 0, 0
can_vote1
voting_power9,799
delayed_votes0
balance0.000 STEEM
savings_balance0.000 STEEM
sbd_balance0.000 SBD
savings_sbd_balance0.000 SBD
vesting_shares8613.879420 VESTS
delegated_vesting_shares0.000000 VESTS
received_vesting_shares0.000000 VESTS
reward_vesting_balance0.000000 VESTS
vesting_balance0.000 STEEM
vesting_withdraw_rate0.000000 VESTS
next_vesting_withdrawal1969-12-31T23:59:59
withdrawn0
to_withdraw0
withdraw_routes0
savings_withdraw_requests0
last_account_recovery1970-01-01T00:00:00
reset_accountnull
last_owner_update1970-01-01T00:00:00
last_account_update2018-11-22T09:09:00
minedNo
sbd_seconds0
sbd_last_interest_payment1970-01-01T00:00:00
savings_sbd_last_interest_payment1970-01-01T00:00:00
{
  "id": 1157835,
  "name": "avalerion",
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM4y89VCqtVE8z3PP69JivgtzgsfNuZzsgNL1XVBD8bW1mQksS7d",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7mTeph5itmfBA8MXkvouG8qoEuYQR3tv4LA7ahQQuAzrHs8R75",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7XmLDgNiQs78isSJfsx8LFedmSQsvzRxns5TBVTsv7VofRqsC7",
        1
      ]
    ]
  },
  "memo_key": "STM7cpV1wTaMMW7HE4QQ7ArLJwPcTbpLaexYeJSF9Br9WqZCtDQvV",
  "json_metadata": "{\"profile\":{\"name\":\"Hack Hex\",\"website\":\"https://hackhex.com\",\"profile_image\":\"https://cdn.steemitimages.com/DQmULhS1DwthRw598V432LZSHQe7fz9oJ2eGHFv5X8XaEoM/New%20Project%20(2).png\"}}",
  "posting_json_metadata": "{\"profile\":{\"name\":\"Hack Hex\",\"website\":\"https://hackhex.com\",\"profile_image\":\"https://cdn.steemitimages.com/DQmULhS1DwthRw598V432LZSHQe7fz9oJ2eGHFv5X8XaEoM/New%20Project%20(2).png\"}}",
  "proxy": "",
  "last_owner_update": "1970-01-01T00:00:00",
  "last_account_update": "2018-11-22T09:09:00",
  "created": "2018-10-19T11:21:00",
  "mined": false,
  "recovery_account": "blocktrades",
  "last_account_recovery": "1970-01-01T00:00:00",
  "reset_account": "null",
  "comment_count": 0,
  "lifetime_vote_count": 0,
  "post_count": 14,
  "can_vote": true,
  "voting_manabar": {
    "current_mana": "8441601831",
    "last_update_time": 1544259630
  },
  "downvote_manabar": {
    "current_mana": 0,
    "last_update_time": 1539948060
  },
  "voting_power": 9799,
  "balance": "0.000 STEEM",
  "savings_balance": "0.000 STEEM",
  "sbd_balance": "0.000 SBD",
  "sbd_seconds": "0",
  "sbd_seconds_last_update": "1970-01-01T00:00:00",
  "sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_sbd_balance": "0.000 SBD",
  "savings_sbd_seconds": "0",
  "savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
  "savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_withdraw_requests": 0,
  "reward_sbd_balance": "0.000 SBD",
  "reward_steem_balance": "0.000 STEEM",
  "reward_vesting_balance": "0.000000 VESTS",
  "reward_vesting_steem": "0.000 STEEM",
  "vesting_shares": "8613.879420 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "vesting_withdraw_rate": "0.000000 VESTS",
  "next_vesting_withdrawal": "1969-12-31T23:59:59",
  "withdrawn": 0,
  "to_withdraw": 0,
  "withdraw_routes": 0,
  "curation_rewards": 0,
  "posting_rewards": 0,
  "proxied_vsf_votes": [
    0,
    0,
    0,
    0
  ],
  "witnesses_voted_for": 0,
  "last_post": "2018-12-08T09:00:30",
  "last_root_post": "2018-12-08T09:00:30",
  "last_vote_time": "2018-12-08T09:00:30",
  "post_bandwidth": 0,
  "pending_claimed_accounts": 0,
  "vesting_balance": "0.000 STEEM",
  "reputation": 655347458,
  "transfer_history": [],
  "market_history": [],
  "post_history": [],
  "vote_history": [],
  "other_history": [],
  "witness_votes": [],
  "tags_usage": [],
  "guest_bloggers": [],
  "rank": 214994
}

Withdraw Routes

IncomingOutgoing
Empty
Empty
{
  "incoming": [],
  "outgoing": []
}
From Date
To Date
2019/10/19 12:35:45
parent authoravalerion
parent permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
authorsteemitboard
permlinksteemitboard-notify-avalerion-20191019t123544000z
title
bodyCongratulations @avalerion! You received a personal award! <table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@avalerion/birthday1.png</td><td>Happy Birthday! - You are on the Steem blockchain for 1 year!</td></tr></table> <sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@avalerion) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=avalerion)_</sub> ###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!
json metadata{"image":["https://steemitboard.com/img/notify.png"]}
Transaction InfoBlock #37420217/Trx afb801d85458df6ed98321fccb04ec3354f32259
View Raw JSON Data
{
  "trx_id": "afb801d85458df6ed98321fccb04ec3354f32259",
  "block": 37420217,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-10-19T12:35:45",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "author": "steemitboard",
      "permlink": "steemitboard-notify-avalerion-20191019t123544000z",
      "title": "",
      "body": "Congratulations @avalerion! You received a personal award!\n\n<table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@avalerion/birthday1.png</td><td>Happy Birthday! - You are on the Steem blockchain for 1 year!</td></tr></table>\n\n<sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@avalerion) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=avalerion)_</sub>\n\n\n###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!",
      "json_metadata": "{\"image\":[\"https://steemitboard.com/img/notify.png\"]}"
    }
  ]
}
2019/01/18 04:41:06
parent authoravalerion
parent permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
authorpartiko
permlinkpartiko-re-avalerion-warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev-20190118t044106244z
title
body[![](https://d1vof77qrk4l5q.cloudfront.net/statics/upsell-delegate-15-steem-power-2.png)](https://partiko-io.app.link/A27hLeUkgT)
json metadata{"app":"partiko"}
Transaction InfoBlock #29553928/Trx 113b0e66f5325f8c89070d576edb3928bfcf3397
View Raw JSON Data
{
  "trx_id": "113b0e66f5325f8c89070d576edb3928bfcf3397",
  "block": 29553928,
  "trx_in_block": 20,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-01-18T04:41:06",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "author": "partiko",
      "permlink": "partiko-re-avalerion-warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev-20190118t044106244z",
      "title": "",
      "body": "[![](https://d1vof77qrk4l5q.cloudfront.net/statics/upsell-delegate-15-steem-power-2.png)](https://partiko-io.app.link/A27hLeUkgT)",
      "json_metadata": "{\"app\":\"partiko\"}"
    }
  ]
}
2018/12/08 14:55:57
voterwglenz
authoravalerion
permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
weight10000 (100.00%)
Transaction InfoBlock #28386305/Trx 25602db7952191226bb7b5bd6f14da1f27675353
View Raw JSON Data
{
  "trx_id": "25602db7952191226bb7b5bd6f14da1f27675353",
  "block": 28386305,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-08T14:55:57",
  "op": [
    "vote",
    {
      "voter": "wglenz",
      "author": "avalerion",
      "permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "weight": 10000
    }
  ]
}
2018/12/08 09:19:30
voterfyrstikken
authoravalerion
permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
weight100 (1.00%)
Transaction InfoBlock #28379580/Trx 428608e6bfcd8e62b934a7bebf4eba6b02b78ba9
View Raw JSON Data
{
  "trx_id": "428608e6bfcd8e62b934a7bebf4eba6b02b78ba9",
  "block": 28379580,
  "trx_in_block": 24,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-08T09:19:30",
  "op": [
    "vote",
    {
      "voter": "fyrstikken",
      "author": "avalerion",
      "permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "weight": 100
    }
  ]
}
2018/12/08 09:00:45
parent authoravalerion
parent permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
authorcheetah
permlinkcheetah-re-avalerionwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://thehackernews.com/2018/12/linux-user-privilege-policykit.html
json metadata
Transaction InfoBlock #28379206/Trx 37f217bd6f9e681bc1371e59d147309b10521116
View Raw JSON Data
{
  "trx_id": "37f217bd6f9e681bc1371e59d147309b10521116",
  "block": 28379206,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-08T09:00:45",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "author": "cheetah",
      "permlink": "cheetah-re-avalerionwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://thehackernews.com/2018/12/linux-user-privilege-policykit.html",
      "json_metadata": ""
    }
  ]
}
2018/12/08 09:00:39
votercheetah
authoravalerion
permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
weight8 (0.08%)
Transaction InfoBlock #28379204/Trx 2d58d38f7a3ba093b393bf0928d34a45cba9e408
View Raw JSON Data
{
  "trx_id": "2d58d38f7a3ba093b393bf0928d34a45cba9e408",
  "block": 28379204,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-08T09:00:39",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "weight": 8
    }
  ]
}
2018/12/08 09:00:30
voteravalerion
authoravalerion
permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
weight10000 (100.00%)
Transaction InfoBlock #28379201/Trx f8b930bbb35dc07970d744653786ef51e07e4073
View Raw JSON Data
{
  "trx_id": "f8b930bbb35dc07970d744653786ef51e07e4073",
  "block": 28379201,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-08T09:00:30",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "weight": 10000
    }
  ]
}
2018/12/08 09:00:30
authoravalerion
permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #28379201/Trx f8b930bbb35dc07970d744653786ef51e07e4073
View Raw JSON Data
{
  "trx_id": "f8b930bbb35dc07970d744653786ef51e07e4073",
  "block": 28379201,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-08T09:00:30",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/12/08 09:00:30
parent author
parent permlinktechnology
authoravalerion
permlinkwarningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev
titleWarning! Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command
body<center>https://hackhex.com/wp-content/uploads/2018/12/Warning-Unprivileged-Linux-Users-With-UID-INT_MAX-Can-Execute-Any-Command.png</center> <br/><div id="articlebody"> <div dir="ltr" style="text-align: left;"> <div class="separator" style="clear: both;">Hold tight, this may blow your mind…</div> A low-privileged user account on most Linux operating systems with UID value anything greater than 2147483647 can execute any systemctl command unauthorizedly—thanks to a newly discovered vulnerability. The reported vulnerability actually resides in PolicyKit (also known as polkit)—an application-level toolkit for Unix-like operating systems that defines policies, handles system-wide privileges and provides a way for non-privileged processes to communicate with privileged ones, such as "sudo," that does not grant root permission to an entire process. The issue, tracked as <a href="https://gitlab.freedesktop.org/polkit/polkit/issues/74" target="_blank" rel="noopener">CVE-2018-19788</a>, impacts PolicyKit version 0.115 which comes pre-installed on most popular Linux distributions, including <a href="https://access.redhat.com/security/cve/cve-2018-19788" target="_blank" rel="noopener">Red Hat</a>, <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915332" target="_blank" rel="noopener">Debian</a>, <a href="https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19788.html" target="_blank" rel="noopener">Ubuntu</a>, and CentOS. The vulnerability exists due to PolicyKit's improper validation of permission requests for any low-privileged user with UID greater than INT_MAX. Where, INT_MAX is a constant in computer programming that defines what maximum value an integer variable can store, which equals to 2147483647 (in hexadecimal 0x7FFFFFFF). So it means, if you create a user account on affected Linux systems with any UID greater than INT_MAX value, the PolicyKit component will allow you to execute any systemctl command successfully. Security researcher Rich Mirch, Twitter handle "<a href="https://twitter.com/0xm1rch" target="_blank" rel="noopener">0xm1rch</a>," has also released a <a href="https://github.com/mirchr/security-research/blob/master/vulnerabilities/CVE-2018-19788.sh" target="_blank" rel="noopener">proof-of-concept</a> (PoC) exploit to successfully demonstrate the vulnerability that requires a user with the UID 4000000000. Red Hat has recommended system administrators not to allow any negative UIDs or UIDs greater than 2147483646 in order to mitigate the issue until the patch is released. </div> </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/warning-unprivileged-linux-users-with-uid-int_max-can-execute-any-command-1334.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/12/Warning-Unprivileged-Linux-Users-With-UID-INT_MAX-Can-Execute-Any-Command.png"],"tags":["technology","news","debian","linux","linuxvulnerability"],"original_link":"https://hackhex.com/computer/warning-unprivileged-linux-users-with-uid-int_max-can-execute-any-command-1334.html"}
Transaction InfoBlock #28379201/Trx f8b930bbb35dc07970d744653786ef51e07e4073
View Raw JSON Data
{
  "trx_id": "f8b930bbb35dc07970d744653786ef51e07e4073",
  "block": 28379201,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-08T09:00:30",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "warningunprivilegedlinuxuserswithuidintmaxcanexecuteanycommand-s23u5ecjev",
      "title": "Warning! Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/12/Warning-Unprivileged-Linux-Users-With-UID-INT_MAX-Can-Execute-Any-Command.png</center> <br/><div id=\"articlebody\">\r\n<div dir=\"ltr\" style=\"text-align: left;\">\r\n<div class=\"separator\" style=\"clear: both;\">Hold tight, this may blow your mind…</div>\r\nA low-privileged user account on most Linux operating systems with UID value anything greater than 2147483647 can execute any systemctl command unauthorizedly—thanks to a newly discovered vulnerability.\r\n\r\nThe reported vulnerability actually resides in PolicyKit (also known as polkit)—an application-level toolkit for Unix-like operating systems that defines policies, handles system-wide privileges and provides a way for non-privileged processes to communicate with privileged ones, such as \"sudo,\" that does not grant root permission to an entire process.\r\n\r\nThe issue, tracked as <a href=\"https://gitlab.freedesktop.org/polkit/polkit/issues/74\" target=\"_blank\" rel=\"noopener\">CVE-2018-19788</a>, impacts PolicyKit version 0.115 which comes pre-installed on most popular Linux distributions, including <a href=\"https://access.redhat.com/security/cve/cve-2018-19788\" target=\"_blank\" rel=\"noopener\">Red Hat</a>, <a href=\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915332\" target=\"_blank\" rel=\"noopener\">Debian</a>, <a href=\"https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19788.html\" target=\"_blank\" rel=\"noopener\">Ubuntu</a>, and CentOS.\r\n\r\nThe vulnerability exists due to PolicyKit's improper validation of permission requests for any low-privileged user with UID greater than INT_MAX.\r\n\r\nWhere, INT_MAX is a constant in computer programming that defines what maximum value an integer variable can store, which equals to 2147483647 (in hexadecimal 0x7FFFFFFF).\r\n\r\nSo it means, if you create a user account on affected Linux systems with any UID greater than INT_MAX value, the PolicyKit component will allow you to execute any systemctl command successfully.\r\n\r\nSecurity researcher Rich Mirch, Twitter handle \"<a href=\"https://twitter.com/0xm1rch\" target=\"_blank\" rel=\"noopener\">0xm1rch</a>,\" has also released a <a href=\"https://github.com/mirchr/security-research/blob/master/vulnerabilities/CVE-2018-19788.sh\" target=\"_blank\" rel=\"noopener\">proof-of-concept</a> (PoC) exploit to successfully demonstrate the vulnerability that requires a user with the UID 4000000000.\r\n\r\nRed Hat has recommended system administrators not to allow any negative UIDs or UIDs greater than 2147483646 in order to mitigate the issue until the patch is released.\r\n\r\n</div>\r\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/warning-unprivileged-linux-users-with-uid-int_max-can-execute-any-command-1334.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/12/Warning-Unprivileged-Linux-Users-With-UID-INT_MAX-Can-Execute-Any-Command.png\"],\"tags\":[\"technology\",\"news\",\"debian\",\"linux\",\"linuxvulnerability\"],\"original_link\":\"https://hackhex.com/computer/warning-unprivileged-linux-users-with-uid-int_max-can-execute-any-command-1334.html\"}"
    }
  ]
}
2018/12/05 01:23:00
parent authoravalerion
parent permlinkdellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86
authorsteemcleaners
permlinkre-avalerion-dellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86-20181205t012258206z
title
body[Source](https://hacknews.co/data-breaches/20181129/dell-resets-all-customers-passwords-after-potential-security-breach.html) [Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah). [More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/) If you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)
json metadata{"app":"steemcleaners/0.3","format":"markdown+html","community":"steemcleaners"}
Transaction InfoBlock #28283718/Trx 0fad8bbd17fd45ea0fa63c19a438e5334b3e3f2e
View Raw JSON Data
{
  "trx_id": "0fad8bbd17fd45ea0fa63c19a438e5334b3e3f2e",
  "block": 28283718,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-05T01:23:00",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "dellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86",
      "author": "steemcleaners",
      "permlink": "re-avalerion-dellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86-20181205t012258206z",
      "title": "",
      "body": "[Source](https://hacknews.co/data-breaches/20181129/dell-resets-all-customers-passwords-after-potential-security-breach.html)\n[Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. \r\n\r\nSpam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah).\r\n\r\n[More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/)\r\n\r\nIf you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)",
      "json_metadata": "{\"app\":\"steemcleaners/0.3\",\"format\":\"markdown+html\",\"community\":\"steemcleaners\"}"
    }
  ]
}
2018/12/05 01:22:51
parent authoravalerion
parent permlinkusbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14
authorsteemcleaners
permlinkre-avalerion-usbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14-20181205t012251334z
title
body[Source](https://www.wired.com/story/us-biotech-firms-made-chinese-crispr-babies-possible/) [Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah). [More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/) If you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)
json metadata{"app":"steemcleaners/0.3","format":"markdown+html","community":"steemcleaners"}
Transaction InfoBlock #28283715/Trx 2df6930c9826026c1029264f98a9931ef19ec328
View Raw JSON Data
{
  "trx_id": "2df6930c9826026c1029264f98a9931ef19ec328",
  "block": 28283715,
  "trx_in_block": 23,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-05T01:22:51",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "usbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14",
      "author": "steemcleaners",
      "permlink": "re-avalerion-usbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14-20181205t012251334z",
      "title": "",
      "body": "[Source](https://www.wired.com/story/us-biotech-firms-made-chinese-crispr-babies-possible/)\n[Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. \r\n\r\nSpam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah).\r\n\r\n[More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/)\r\n\r\nIf you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)",
      "json_metadata": "{\"app\":\"steemcleaners/0.3\",\"format\":\"markdown+html\",\"community\":\"steemcleaners\"}"
    }
  ]
}
2018/12/05 01:22:45
parent authoravalerion
parent permlinkspacephotosoftheweekpackingformars-u4dfhoxn39
authorsteemcleaners
permlinkre-avalerion-spacephotosoftheweekpackingformars-u4dfhoxn39-20181205t012245523z
title
body[Source](https://www.wired.com/story/space-photos-of-the-week-insight-rover/) [Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah). [More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/) If you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)
json metadata{"app":"steemcleaners/0.3","format":"markdown+html","community":"steemcleaners"}
Transaction InfoBlock #28283713/Trx 53e76bd2ab12d67b3b998c2f9a1500a1e214c931
View Raw JSON Data
{
  "trx_id": "53e76bd2ab12d67b3b998c2f9a1500a1e214c931",
  "block": 28283713,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-05T01:22:45",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "spacephotosoftheweekpackingformars-u4dfhoxn39",
      "author": "steemcleaners",
      "permlink": "re-avalerion-spacephotosoftheweekpackingformars-u4dfhoxn39-20181205t012245523z",
      "title": "",
      "body": "[Source](https://www.wired.com/story/space-photos-of-the-week-insight-rover/)\n[Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. \r\n\r\nSpam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah).\r\n\r\n[More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/)\r\n\r\nIf you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)",
      "json_metadata": "{\"app\":\"steemcleaners/0.3\",\"format\":\"markdown+html\",\"community\":\"steemcleaners\"}"
    }
  ]
}
2018/12/05 01:22:39
parent authoravalerion
parent permlinkmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
authorsteemcleaners
permlinkre-avalerion-microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm-20181205t012238229z
title
body[Source](https://trovapassword.com/blog/microsoft-building-chrome-based-browser-to-replace-edge-on-windows-10/) [Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah). [More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/) If you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)
json metadata{"app":"steemcleaners/0.3","format":"markdown+html","community":"steemcleaners"}
Transaction InfoBlock #28283711/Trx 7741c8d3c65a77532121fca4a65b97dffb862243
View Raw JSON Data
{
  "trx_id": "7741c8d3c65a77532121fca4a65b97dffb862243",
  "block": 28283711,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-05T01:22:39",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "author": "steemcleaners",
      "permlink": "re-avalerion-microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm-20181205t012238229z",
      "title": "",
      "body": "[Source](https://trovapassword.com/blog/microsoft-building-chrome-based-browser-to-replace-edge-on-windows-10/)\n[Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. \r\n\r\nSpam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah).\r\n\r\n[More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/)\r\n\r\nIf you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)",
      "json_metadata": "{\"app\":\"steemcleaners/0.3\",\"format\":\"markdown+html\",\"community\":\"steemcleaners\"}"
    }
  ]
}
2018/12/05 01:22:33
parent authoravalerion
parent permlinkquoraishacked100millionusersdatastolen-77j61vwm0d
authorsteemcleaners
permlinkre-avalerion-quoraishacked100millionusersdatastolen-77j61vwm0d-20181205t012232028z
title
body[Source](https://trovapassword.com/blog/quora-gets-hacked-100-million-users-data-stolen/) [Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah). [More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/) If you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)
json metadata{"app":"steemcleaners/0.3","format":"markdown+html","community":"steemcleaners"}
Transaction InfoBlock #28283709/Trx 315aa792d56513c5dd077571b6b8fcb7a897cf65
View Raw JSON Data
{
  "trx_id": "315aa792d56513c5dd077571b6b8fcb7a897cf65",
  "block": 28283709,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-05T01:22:33",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "quoraishacked100millionusersdatastolen-77j61vwm0d",
      "author": "steemcleaners",
      "permlink": "re-avalerion-quoraishacked100millionusersdatastolen-77j61vwm0d-20181205t012232028z",
      "title": "",
      "body": "[Source](https://trovapassword.com/blog/quora-gets-hacked-100-million-users-data-stolen/)\n[Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. \r\n\r\nSpam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah).\r\n\r\n[More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/)\r\n\r\nIf you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)",
      "json_metadata": "{\"app\":\"steemcleaners/0.3\",\"format\":\"markdown+html\",\"community\":\"steemcleaners\"}"
    }
  ]
}
2018/12/04 16:43:45
voteravalerion
authorcheetah
permlinkcheetah-re-avalerionmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
weight10000 (100.00%)
Transaction InfoBlock #28273334/Trx 6f10205bbf0bbd3043ae18149fdd17c080ef8e89
View Raw JSON Data
{
  "trx_id": "6f10205bbf0bbd3043ae18149fdd17c080ef8e89",
  "block": 28273334,
  "trx_in_block": 24,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T16:43:45",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "cheetah",
      "permlink": "cheetah-re-avalerionmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "weight": 10000
    }
  ]
}
2018/12/04 16:18:39
parent authoravalerion
parent permlinkquoraishacked100millionusersdatastolen-77j61vwm0d
authorcheetah
permlinkcheetah-re-avalerionquoraishacked100millionusersdatastolen-77j61vwm0d
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://trovapassword.com/blog/quora-gets-hacked-100-million-users-data-stolen/
json metadata
Transaction InfoBlock #28272832/Trx 6e83658764996c1a92d7373d6e166d63b3c8649d
View Raw JSON Data
{
  "trx_id": "6e83658764996c1a92d7373d6e166d63b3c8649d",
  "block": 28272832,
  "trx_in_block": 26,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T16:18:39",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "quoraishacked100millionusersdatastolen-77j61vwm0d",
      "author": "cheetah",
      "permlink": "cheetah-re-avalerionquoraishacked100millionusersdatastolen-77j61vwm0d",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://trovapassword.com/blog/quora-gets-hacked-100-million-users-data-stolen/",
      "json_metadata": ""
    }
  ]
}
2018/12/04 16:18:33
votercheetah
authoravalerion
permlinkquoraishacked100millionusersdatastolen-77j61vwm0d
weight8 (0.08%)
Transaction InfoBlock #28272830/Trx b1901fd0061f41088a793c5647acded7f68e6265
View Raw JSON Data
{
  "trx_id": "b1901fd0061f41088a793c5647acded7f68e6265",
  "block": 28272830,
  "trx_in_block": 36,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T16:18:33",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "quoraishacked100millionusersdatastolen-77j61vwm0d",
      "weight": 8
    }
  ]
}
2018/12/04 16:18:24
voteravalerion
authoravalerion
permlinkquoraishacked100millionusersdatastolen-77j61vwm0d
weight10000 (100.00%)
Transaction InfoBlock #28272827/Trx fa122e02acb5c388656a40a52833f9a1efda2e7d
View Raw JSON Data
{
  "trx_id": "fa122e02acb5c388656a40a52833f9a1efda2e7d",
  "block": 28272827,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T16:18:24",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "quoraishacked100millionusersdatastolen-77j61vwm0d",
      "weight": 10000
    }
  ]
}
2018/12/04 16:18:24
authoravalerion
permlinkquoraishacked100millionusersdatastolen-77j61vwm0d
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #28272827/Trx fa122e02acb5c388656a40a52833f9a1efda2e7d
View Raw JSON Data
{
  "trx_id": "fa122e02acb5c388656a40a52833f9a1efda2e7d",
  "block": 28272827,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T16:18:24",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "quoraishacked100millionusersdatastolen-77j61vwm0d",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/12/04 16:18:24
parent author
parent permlinktechnology
authoravalerion
permlinkquoraishacked100millionusersdatastolen-77j61vwm0d
titleQuora is Hacked! 100 Million Users Data Stolen
body<center>https://hackhex.com/wp-content/uploads/2018/12/Quora-Gets-Hacked-–-100-Million-Users-Data-Stolen.jpg</center> <br/><div id="articlebody"> <div dir="ltr" style="text-align: left;"> The World's most popular question-and-answer website <b>Quora</b> has suffered a massive data breach with unknown hackers gaining unauthorized access to potentially sensitive personal information of about 100 million of its users. Quora announced the incident late Monday after its team last Friday discovered that an unidentified malicious third-party managed to gain unauthorized access to one of its systems and stole data on approximately 100 million users—that's almost half of its entire user base. According to Adam D'Angelo, the chief executive officer and co-founder of Quora, the personal user information compromised in the breach includes: <ul style="text-align: left;"> <li><b>Account information</b>, such as names, email addresses, encrypted (hashed) passwords, and data imported from linked social networks like Facebook and Twitter when authorized by users.</li> <li><b>Public content and actions</b>, like questions, answers, comments, and upvotes.</li> <li><b>Non-public content and actions</b>, including answer requests, downvotes, direct and messages (note that a low percentage of Quora users have sent or received such messages).</li> </ul> Quora said it stores salted and hashed passwords to prevent them from cracking, but as a precaution, the company has logged all compromised users out of their Quora accounts, and forcing them to reset their passwords. Quora said it is still investigating the breach and assured its users that it working rapidly to "take the appropriate steps to prevent such incidents in the future." <blockquote class="tr_bq">"We're still investigating the precise causes, and in addition to the work being conducted by our internal security teams, we have retained leading digital forensics and security firm to assist us. We have also notified law enforcement officials," Adam said in a <a href="https://blog.quora.com/Quora-Security-Update" target="_blank" rel="noopener">blog post</a>. </blockquote> Quora is notifying affected users of the breach through emails, but if you think you are compromised, you can head on to the company's <a href="https://help.quora.com/hc/en-us/articles/360020212652-Quora-Security-Update-FAQ" target="_blank" rel="noopener">FAQ</a> to find out every detail about the incident. Quora's data breach is the latest in a series of high-profile hacks. Just last week, the world's biggest hotel chain Marriott confirmed a breach of its Starwood properties that potentially exposed personal and, in some cases, financial information from half a billion guests, making it the second largest data breaches in the history behind Yahoo 2016 hacking of nearly 3 billion users. In September, Facebook also announced a breach of its network that allowed hackers to steal personal details for about 30 million users using a zero-day flaw in the platform's "View As" feature. </div> </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/quora-is-hacked-100-million-users-data-stolen-1212.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/12/Quora-Gets-Hacked-–-100-Million-Users-Data-Stolen.jpg"],"tags":["technology","news","cybersecurity","databreach","hackingnews"],"original_link":"https://hackhex.com/computer/quora-is-hacked-100-million-users-data-stolen-1212.html"}
Transaction InfoBlock #28272827/Trx fa122e02acb5c388656a40a52833f9a1efda2e7d
View Raw JSON Data
{
  "trx_id": "fa122e02acb5c388656a40a52833f9a1efda2e7d",
  "block": 28272827,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T16:18:24",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "quoraishacked100millionusersdatastolen-77j61vwm0d",
      "title": "Quora is Hacked! 100 Million Users Data Stolen",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/12/Quora-Gets-Hacked-–-100-Million-Users-Data-Stolen.jpg</center> <br/><div id=\"articlebody\">\r\n<div dir=\"ltr\" style=\"text-align: left;\">\r\n\r\nThe World's most popular question-and-answer website <b>Quora</b> has suffered a massive data breach with unknown hackers gaining unauthorized access to potentially sensitive personal information of about 100 million of its users.\r\n\r\nQuora announced the incident late Monday after its team last Friday discovered that an unidentified malicious third-party managed to gain unauthorized access to one of its systems and stole data on approximately 100 million users—that's almost half of its entire user base.\r\n\r\nAccording to Adam D'Angelo, the chief executive officer and co-founder of Quora, the personal user information compromised in the breach includes:\r\n<ul style=\"text-align: left;\">\r\n <li><b>Account information</b>, such as names, email addresses, encrypted (hashed) passwords, and data imported from linked social networks like Facebook and Twitter when authorized by users.</li>\r\n <li><b>Public content and actions</b>, like questions, answers, comments, and upvotes.</li>\r\n <li><b>Non-public content and actions</b>, including answer requests, downvotes, direct and messages (note that a low percentage of Quora users have sent or received such messages).</li>\r\n</ul>\r\nQuora said it stores salted and hashed passwords to prevent them from cracking, but as a precaution, the company has logged all compromised users out of their Quora accounts, and forcing them to reset their passwords.\r\n\r\nQuora said it is still investigating the breach and assured its users that it working rapidly to \"take the appropriate steps to prevent such incidents in the future.\"\r\n<blockquote class=\"tr_bq\">\"We're still investigating the precise causes, and in addition to the work being conducted by our internal security teams, we have retained leading digital forensics and security firm to assist us. We have also notified law enforcement officials,\" Adam said in a <a href=\"https://blog.quora.com/Quora-Security-Update\" target=\"_blank\" rel=\"noopener\">blog post</a>.\n</blockquote>\r\nQuora is notifying affected users of the breach through emails, but if you think you are compromised, you can head on to the company's <a href=\"https://help.quora.com/hc/en-us/articles/360020212652-Quora-Security-Update-FAQ\" target=\"_blank\" rel=\"noopener\">FAQ</a> to find out every detail about the incident.\r\n\r\nQuora's data breach is the latest in a series of high-profile hacks.\r\n\r\nJust last week, the world's biggest hotel chain Marriott confirmed a breach of its Starwood properties that potentially exposed personal and, in some cases, financial information from half a billion guests, making it the second largest data breaches in the history behind Yahoo 2016 hacking of nearly 3 billion users.\r\n\r\nIn September, Facebook also announced a breach of its network that allowed hackers to steal personal details for about 30 million users using a zero-day flaw in the platform's \"View As\" feature.\r\n\r\n</div>\r\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/quora-is-hacked-100-million-users-data-stolen-1212.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/12/Quora-Gets-Hacked-–-100-Million-Users-Data-Stolen.jpg\"],\"tags\":[\"technology\",\"news\",\"cybersecurity\",\"databreach\",\"hackingnews\"],\"original_link\":\"https://hackhex.com/computer/quora-is-hacked-100-million-users-data-stolen-1212.html\"}"
    }
  ]
}
2018/12/04 16:02:15
voterdevsup
authoravalerion
permlinkmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
weight69 (0.69%)
Transaction InfoBlock #28272504/Trx ebb6406364bc46a7d8bf74178d7278cf8547f961
View Raw JSON Data
{
  "trx_id": "ebb6406364bc46a7d8bf74178d7278cf8547f961",
  "block": 28272504,
  "trx_in_block": 39,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T16:02:15",
  "op": [
    "vote",
    {
      "voter": "devsup",
      "author": "avalerion",
      "permlink": "microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "weight": 69
    }
  ]
}
2018/12/04 15:47:33
parent authoravalerion
parent permlinkmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
authorcheetah
permlinkcheetah-re-avalerionmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://trovapassword.com/blog/microsoft-building-chrome-based-browser-to-replace-edge-on-windows-10/
json metadata
Transaction InfoBlock #28272210/Trx 878979d2b51aa363b89a88a9473c97858df78f01
View Raw JSON Data
{
  "trx_id": "878979d2b51aa363b89a88a9473c97858df78f01",
  "block": 28272210,
  "trx_in_block": 22,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T15:47:33",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "author": "cheetah",
      "permlink": "cheetah-re-avalerionmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://trovapassword.com/blog/microsoft-building-chrome-based-browser-to-replace-edge-on-windows-10/",
      "json_metadata": ""
    }
  ]
}
2018/12/04 15:47:30
votercheetah
authoravalerion
permlinkmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
weight8 (0.08%)
Transaction InfoBlock #28272209/Trx 741002fbca77e3d15cc7d362699b4fb292650828
View Raw JSON Data
{
  "trx_id": "741002fbca77e3d15cc7d362699b4fb292650828",
  "block": 28272209,
  "trx_in_block": 17,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T15:47:30",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "weight": 8
    }
  ]
}
2018/12/04 15:47:18
voteravalerion
authoravalerion
permlinkmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
weight10000 (100.00%)
Transaction InfoBlock #28272205/Trx bbbc5c601d7907bfffbd08f89a6890ef02cee1ba
View Raw JSON Data
{
  "trx_id": "bbbc5c601d7907bfffbd08f89a6890ef02cee1ba",
  "block": 28272205,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T15:47:18",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "weight": 10000
    }
  ]
}
2018/12/04 15:47:18
authoravalerion
permlinkmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #28272205/Trx bbbc5c601d7907bfffbd08f89a6890ef02cee1ba
View Raw JSON Data
{
  "trx_id": "bbbc5c601d7907bfffbd08f89a6890ef02cee1ba",
  "block": 28272205,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T15:47:18",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/12/04 15:47:18
parent author
parent permlinktechnology
authoravalerion
permlinkmicrosoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm
titleMicrosoft building Chrome-based browser to replace Edge on Windows 10
body<center>https://hackhex.com/wp-content/uploads/2018/12/Microsoft-building-Chrome-based-browser-to-replace-Edge-on-Windows-10.png</center> <br/><div id="articlebody"> <div class="separator" style="clear: both; text-align: center;"></div> It is no secret how miserably Microsoft's 3-year-old <b>Edge web browser</b> has failed to compete against Google Chrome despite substantial investment and continuous improvements. According to the latest round of tech rumors, Microsoft has given up on Edge and reportedly building a new <b>Chromium</b>-based web browser, dubbed project codename "<b>Anaheim</b>" internally, that will replace Edge on Windows 10 operating system as its new default browser, a journalist at WindowsCentral learned. Though there is no mention of Project Anaheim on the Microsoft website as of now (except Anaheim Convention Center at California), many speculate that the new built-in browser could appear in the 19H1 development cycle of Microsoft's Insider Preview program. According to the report, the new browser will be powered by Blink rendering engine used by Chromium, one that also powers Google's Chrome browser, instead of Microsoft's own EdgeHTML engine. Chromium is an open-source Web browser project started by Google that is popular among web browser developers and also powers Vivaldi and Opera browsers. <blockquote class="tr_bq">"It’s unknown at this time if Anaheim will use the Edge brand or a new brand, or if the user interface between Edge and Anaheim is different. One thing is for sure, however; EdgeHTML is dead," the <a href="https://www.windowscentral.com/microsoft-building-chromium-powered-web-browser-windows-10" target="_blank" rel="noopener">report said</a>. </blockquote> If you are unaware, Microsoft has already been using the Chromium rendering engine for its Edge browser on Android and iOS devices. Details on Microsoft's new Anaheim web browser are still scarce, and we are waiting to hear more about the project from Microsoft itself, but Windows Central speculates that we could see the new browser in action as early as April of next year. If the rumor is true, Google who celebrated the 10th anniversary of its Chrome web browser this year will gain an unbeatable monopoly in the browser market. </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/microsoft-building-chrome-based-browser-to-replace-edge-on-windows-10-1215.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/12/Microsoft-building-Chrome-based-browser-to-replace-Edge-on-Windows-10.png"],"tags":["technology","news","browserrenderingengines","browsersecurity","chromewebbrowser"],"original_link":"https://hackhex.com/computer/microsoft-building-chrome-based-browser-to-replace-edge-on-windows-10-1215.html"}
Transaction InfoBlock #28272205/Trx bbbc5c601d7907bfffbd08f89a6890ef02cee1ba
View Raw JSON Data
{
  "trx_id": "bbbc5c601d7907bfffbd08f89a6890ef02cee1ba",
  "block": 28272205,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-04T15:47:18",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "microsoftbuildingchrome-basedbrowsertoreplaceedgeonwindows10-31rxie5ywm",
      "title": "Microsoft building Chrome-based browser to replace Edge on Windows 10",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/12/Microsoft-building-Chrome-based-browser-to-replace-Edge-on-Windows-10.png</center> <br/><div id=\"articlebody\">\r\n<div class=\"separator\" style=\"clear: both; text-align: center;\"></div>\r\nIt is no secret how miserably Microsoft's 3-year-old <b>Edge web browser</b> has failed to compete against Google Chrome despite substantial investment and continuous improvements.\r\n\r\nAccording to the latest round of tech rumors, Microsoft has given up on Edge and reportedly building a new <b>Chromium</b>-based web browser, dubbed project codename \"<b>Anaheim</b>\" internally, that will replace Edge on Windows 10 operating system as its new default browser, a journalist at WindowsCentral learned.\r\n\r\nThough there is no mention of Project Anaheim on the Microsoft website as of now (except Anaheim Convention Center at California), many speculate that the new built-in browser could appear in the 19H1 development cycle of Microsoft's Insider Preview program.\r\n\r\nAccording to the report, the new browser will be powered by Blink rendering engine used by Chromium, one that also powers Google's Chrome browser, instead of Microsoft's own EdgeHTML engine.\r\n\r\nChromium is an open-source Web browser project started by Google that is popular among web browser developers and also powers Vivaldi and Opera browsers.\r\n<blockquote class=\"tr_bq\">\"It’s unknown at this time if Anaheim will use the Edge brand or a new brand, or if the user interface between Edge and Anaheim is different. One thing is for sure, however; EdgeHTML is dead,\" the <a href=\"https://www.windowscentral.com/microsoft-building-chromium-powered-web-browser-windows-10\" target=\"_blank\" rel=\"noopener\">report said</a>.\n</blockquote>\r\nIf you are unaware, Microsoft has already been using the Chromium rendering engine for its Edge browser on Android and iOS devices.\r\n\r\nDetails on Microsoft's new Anaheim web browser are still scarce, and we are waiting to hear more about the project from Microsoft itself, but Windows Central speculates that we could see the new browser in action as early as April of next year.\r\n\r\nIf the rumor is true, Google who celebrated the 10th anniversary of its Chrome web browser this year will gain an unbeatable monopoly in the browser market.\r\n\r\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/microsoft-building-chrome-based-browser-to-replace-edge-on-windows-10-1215.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/12/Microsoft-building-Chrome-based-browser-to-replace-Edge-on-Windows-10.png\"],\"tags\":[\"technology\",\"news\",\"browserrenderingengines\",\"browsersecurity\",\"chromewebbrowser\"],\"original_link\":\"https://hackhex.com/computer/microsoft-building-chrome-based-browser-to-replace-edge-on-windows-10-1215.html\"}"
    }
  ]
}
2018/12/01 20:01:03
voterdavidfnck
authoravalerion
permlinkspacephotosoftheweekpackingformars-u4dfhoxn39
weight3000 (30.00%)
Transaction InfoBlock #28190908/Trx 193f8d0ab98256f01c2e3def5465b3014c5b72ca
View Raw JSON Data
{
  "trx_id": "193f8d0ab98256f01c2e3def5465b3014c5b72ca",
  "block": 28190908,
  "trx_in_block": 30,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-01T20:01:03",
  "op": [
    "vote",
    {
      "voter": "davidfnck",
      "author": "avalerion",
      "permlink": "spacephotosoftheweekpackingformars-u4dfhoxn39",
      "weight": 3000
    }
  ]
}
2018/12/01 19:44:54
votergarrettwallace
authoravalerion
permlinkspacephotosoftheweekpackingformars-u4dfhoxn39
weight100 (1.00%)
Transaction InfoBlock #28190586/Trx 1f97bb1f99b0ee6a9b852f87d8b2b90223aa924e
View Raw JSON Data
{
  "trx_id": "1f97bb1f99b0ee6a9b852f87d8b2b90223aa924e",
  "block": 28190586,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-01T19:44:54",
  "op": [
    "vote",
    {
      "voter": "garrettwallace",
      "author": "avalerion",
      "permlink": "spacephotosoftheweekpackingformars-u4dfhoxn39",
      "weight": 100
    }
  ]
}
2018/12/01 19:37:36
parent authoravalerion
parent permlinkspacephotosoftheweekpackingformars-u4dfhoxn39
authorcheetah
permlinkcheetah-re-avalerionspacephotosoftheweekpackingformars-u4dfhoxn39
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://www.wired.com/story/space-photos-of-the-week-insight-rover/
json metadata
Transaction InfoBlock #28190440/Trx 08ad8512cb564e661c943758a4fe868037a5644f
View Raw JSON Data
{
  "trx_id": "08ad8512cb564e661c943758a4fe868037a5644f",
  "block": 28190440,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-01T19:37:36",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "spacephotosoftheweekpackingformars-u4dfhoxn39",
      "author": "cheetah",
      "permlink": "cheetah-re-avalerionspacephotosoftheweekpackingformars-u4dfhoxn39",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://www.wired.com/story/space-photos-of-the-week-insight-rover/",
      "json_metadata": ""
    }
  ]
}
2018/12/01 19:37:30
votercheetah
authoravalerion
permlinkspacephotosoftheweekpackingformars-u4dfhoxn39
weight8 (0.08%)
Transaction InfoBlock #28190438/Trx 17fa04fdf067fd6128eb3109343fbf1027c864bf
View Raw JSON Data
{
  "trx_id": "17fa04fdf067fd6128eb3109343fbf1027c864bf",
  "block": 28190438,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-01T19:37:30",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "spacephotosoftheweekpackingformars-u4dfhoxn39",
      "weight": 8
    }
  ]
}
2018/12/01 19:37:15
voteravalerion
authoravalerion
permlinkspacephotosoftheweekpackingformars-u4dfhoxn39
weight10000 (100.00%)
Transaction InfoBlock #28190433/Trx 149082ebce7877aaa0edad9025b26ccd810bf7a1
View Raw JSON Data
{
  "trx_id": "149082ebce7877aaa0edad9025b26ccd810bf7a1",
  "block": 28190433,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-01T19:37:15",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "spacephotosoftheweekpackingformars-u4dfhoxn39",
      "weight": 10000
    }
  ]
}
2018/12/01 19:37:15
authoravalerion
permlinkspacephotosoftheweekpackingformars-u4dfhoxn39
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #28190433/Trx 149082ebce7877aaa0edad9025b26ccd810bf7a1
View Raw JSON Data
{
  "trx_id": "149082ebce7877aaa0edad9025b26ccd810bf7a1",
  "block": 28190433,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-01T19:37:15",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "spacephotosoftheweekpackingformars-u4dfhoxn39",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/12/01 19:37:15
parent author
parent permlinktechnology
authoravalerion
permlinkspacephotosoftheweekpackingformars-u4dfhoxn39
titleSpace Photos of the Week: Packing for Mars
body<center>https://hackhex.com/wp-content/uploads/2018/12/Space-Photos-of-the-Week-Packing-for-Mars.jpg</center> <br/><div id=""> This odd zigzagging terrain is part of Mars’s south pole. These odd features are a result of the Martian seasonal changes. As the water ice that forms in the winter thaws, dry ice underneath it evaporates, leaving these irregular shapes. By observing the seasonal changes on Mars with the HiRise camera on board the Mars Reconnaissance Orbiter, scientists can piece together the bigger climate picture for our dusty planetary neighbor. After journeying to the south pole, we now find ourselves at the north pole during springtime. This synaptic pattern is caused by the slow thawing of carbon dioxide ice on the surface. As the planet warms in spring, the ice evaporates, leaving behind this elaborate polygon pattern. The bluish patches here are carbon dioxide snow. This photo was taken by the HiRise camera in 2008, when NASA was trying to determine where to place its Phoenix lander. This special photo is a first for all of space exploration. This is Mars as seen by one of the MarCO CubeSats that traveled alongside InSight on its way to Mars. The two CubeSats and InSight launched from Earth on an Atlas V rocket. Once they were far enough away, the rocket released the trio, and they traveled together to Mars. This wide-angle view shows Mars huge in the background while the high-gain antenna is seen to the right of the frame. When MarCO-B took this photo, it had just completed its primary mission: The pair of mini satellites relayed real-time data back to Earth during the “7 minutes of terror,” which is when InSight plunged through the Mars atmosphere and down to the surface. This colorful cloud is called the Rosetta Nebula, and it’s what’s known as an emission nebula. As gas and dust collide, new stars are created, and the force of these stellar births pushes the surrounding gas and dust away. During that process, it begins to glow as a result of radiation from the stars’ formation. This image was captured by the European Southern Observatory’s Very Large Telescope in Chile. Meet Apep—a binary star system that has never been imaged before. The photo, taken by the European Southern Observatory’s Very Large Telescope, shows a pair of stars orbiting each other. Their interaction causes huge stellar winds that push gas and dust around their dance, leaving behind this swirling dust cloud. Abel 1033 is boldly going where no galaxy cluster has gone before. It is shaped like the USS <em>Enterprise</em> from <em>Star Trek</em>, but sadly it is not a secret gas spaceship but an odd remnant left behind from a collision of two galaxy clusters. Galaxy clusters are the largest known objects in the universe—they can contain thousands of galaxies each and are all bound together by gravity. However, the gas that exists around them can have as much as six times the mass of all the galaxies combined, and that gas is hard to see in only visible light. By combining data from the Chandra X-Ray Observatory, seen here in the purples, and radio observations seen in the blue, the full shape created by the interaction becomes visible. Welcome to Mars, InSight! This image of Mars, captured by the European Space Agency’s Mars Express Orbiter, shows a region called Elysium Planitia, which is where InSight just landed. (It’s sort of between the black dot at the lower right and the raised candy cane at 3 o’clock.) The lander will operate there for two years while it studies the interior of the planet, searching for marsquakes and studying the heat from below the surface. The area where InSight has set up shop is away from hills and volcano remnants, and that’s a good thing, because InSight needed a very flat and “boring” place to live on Mars. And now Insight has a friendly (sort of) neighbor—it's only a few hundred miles north of where the Curiosity rover is roaming around. </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/science/space-photos-of-the-week-packing-for-mars-1078.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/12/Space-Photos-of-the-Week-Packing-for-Mars.jpg"],"tags":["technology","news"],"original_link":"https://hackhex.com/science/space-photos-of-the-week-packing-for-mars-1078.html"}
Transaction InfoBlock #28190433/Trx 149082ebce7877aaa0edad9025b26ccd810bf7a1
View Raw JSON Data
{
  "trx_id": "149082ebce7877aaa0edad9025b26ccd810bf7a1",
  "block": 28190433,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-12-01T19:37:15",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "spacephotosoftheweekpackingformars-u4dfhoxn39",
      "title": "Space Photos of the Week: Packing for Mars",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/12/Space-Photos-of-the-Week-Packing-for-Mars.jpg</center> <br/><div id=\"\">\r\n\r\nThis odd zigzagging terrain is part of Mars’s south pole. These odd features are a result of the Martian seasonal changes. As the water ice that forms in the winter thaws, dry ice underneath it evaporates, leaving these irregular shapes. By observing the seasonal changes on Mars with the HiRise camera on board the Mars Reconnaissance Orbiter, scientists can piece together the bigger climate picture for our dusty planetary neighbor.\r\n\r\nAfter journeying to the south pole, we now find ourselves at the north pole during springtime. This synaptic pattern is caused by the slow thawing of carbon dioxide ice on the surface. As the planet warms in spring, the ice evaporates, leaving behind this elaborate polygon pattern. The bluish patches here are carbon dioxide snow. This photo was taken by the HiRise camera in 2008, when NASA was trying to determine where to place its Phoenix lander.\r\n\r\nThis special photo is a first for all of space exploration. This is Mars as seen by one of the MarCO CubeSats that traveled alongside InSight on its way to Mars. The two CubeSats and InSight launched from Earth on an Atlas V rocket. Once they were far enough away, the rocket released the trio, and they traveled together to Mars. This wide-angle view shows Mars huge in the background while the high-gain antenna is seen to the right of the frame. When MarCO-B took this photo, it had just completed its primary mission: The pair of mini satellites relayed real-time data back to Earth during the “7 minutes of terror,” which is when InSight plunged through the Mars atmosphere and down to the surface.\r\n\r\nThis colorful cloud is called the Rosetta Nebula, and it’s what’s known as an emission nebula. As gas and dust collide, new stars are created, and the force of these stellar births pushes the surrounding gas and dust away. During that process, it begins to glow as a result of radiation from the stars’ formation. This image was captured by the European Southern Observatory’s Very Large Telescope in Chile.\r\n\r\nMeet Apep—a binary star system that has never been imaged before. The photo, taken by the European Southern Observatory’s Very Large Telescope, shows a pair of stars orbiting each other. Their interaction causes huge stellar winds that push gas and dust around their dance, leaving behind this swirling dust cloud.\r\n\r\nAbel 1033 is boldly going where no galaxy cluster has gone before. It is shaped like the USS <em>Enterprise</em> from <em>Star Trek</em>, but sadly it is not a secret gas spaceship but an odd remnant left behind from a collision of two galaxy clusters. Galaxy clusters are the largest known objects in the universe—they can contain thousands of galaxies each and are all bound together by gravity. However, the gas that exists around them can have as much as six times the mass of all the galaxies combined, and that gas is hard to see in only visible light. By combining data from the Chandra X-Ray Observatory, seen here in the purples, and radio observations seen in the blue, the full shape created by the interaction becomes visible.\r\n\r\nWelcome to Mars, InSight! This image of Mars, captured by the European Space Agency’s Mars Express Orbiter, shows a region called Elysium Planitia, which is where InSight just landed. (It’s sort of between the black dot at the lower right and the raised candy cane at 3 o’clock.) The lander will operate there for two years while it studies the interior of the planet, searching for marsquakes and studying the heat from below the surface. The area where InSight has set up shop is away from hills and volcano remnants, and that’s a good thing, because InSight needed a very flat and “boring” place to live on Mars. And now Insight has a friendly (sort of) neighbor—it's only a few hundred miles north of where the Curiosity rover is roaming around.\r\n\r\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/science/space-photos-of-the-week-packing-for-mars-1078.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/12/Space-Photos-of-the-Week-Packing-for-Mars.jpg\"],\"tags\":[\"technology\",\"news\"],\"original_link\":\"https://hackhex.com/science/space-photos-of-the-week-packing-for-mars-1078.html\"}"
    }
  ]
}
2018/11/30 18:19:12
parent authoravalerion
parent permlinkusbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14
authorcheetah
permlinkcheetah-re-avalerionusbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://www.wired.com/story/us-biotech-firms-made-chinese-crispr-babies-possible/
json metadata
Transaction InfoBlock #28160082/Trx 94ee624d4fd2224d2a53a97515d61f6dfa3bf515
View Raw JSON Data
{
  "trx_id": "94ee624d4fd2224d2a53a97515d61f6dfa3bf515",
  "block": 28160082,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-30T18:19:12",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "usbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14",
      "author": "cheetah",
      "permlink": "cheetah-re-avalerionusbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://www.wired.com/story/us-biotech-firms-made-chinese-crispr-babies-possible/",
      "json_metadata": ""
    }
  ]
}
2018/11/30 18:19:06
votercheetah
authoravalerion
permlinkusbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14
weight8 (0.08%)
Transaction InfoBlock #28160080/Trx e45e77e9ce588b2728a180eda7424891f48d70e9
View Raw JSON Data
{
  "trx_id": "e45e77e9ce588b2728a180eda7424891f48d70e9",
  "block": 28160080,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-30T18:19:06",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "usbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14",
      "weight": 8
    }
  ]
}
2018/11/30 18:18:57
voteravalerion
authoravalerion
permlinkusbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14
weight10000 (100.00%)
Transaction InfoBlock #28160077/Trx 87f048c5857f5e04215e80ebbd9bc155f116b57a
View Raw JSON Data
{
  "trx_id": "87f048c5857f5e04215e80ebbd9bc155f116b57a",
  "block": 28160077,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-30T18:18:57",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "usbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14",
      "weight": 10000
    }
  ]
}
2018/11/30 18:18:57
authoravalerion
permlinkusbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #28160077/Trx 87f048c5857f5e04215e80ebbd9bc155f116b57a
View Raw JSON Data
{
  "trx_id": "87f048c5857f5e04215e80ebbd9bc155f116b57a",
  "block": 28160077,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-30T18:18:57",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "usbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/11/30 18:18:57
parent author
parent permlinktechnology
authoravalerion
permlinkusbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14
titleUS Biotech Firms Made China's Gene-Edited Babies Possible
body<div> In 2015, the 12-person organizing committee of the first International Summit on Human Gene Editing—which included Crispr co-inventors Jennifer Doudna and Emmanuelle Charpentier—issued a statement on how the world should responsibly push forward the science of permanently altering the DNA of <em>Homo sapiens</em>. Combined with other changes that had sprung biology free from the ivory tower, the concern was that someone with a modicum of expertise would go rogue and start a Crispr-It-Yourself baby project. Only three years later, we now know that someone is named He Jiankui. On Wednesday, the Chinese-born, American-trained scientist shared details of the first such experiment, in which He claims to have Crispr’d a pair of twin girls and implanted one additional edited embryo in a woman’s womb. The news was met with nearly universal condemnation from the world’s scientists. Chinese government authorities ordered an investigation, <a href="https://www.cnn.com/2018/11/29/health/china-gene-editing-he-jiankui-intl/index.html" target="_blank" rel="noopener">calling</a> it a brazen violation of Chinese law and a breach of an ethical bottom line, “which is both shocking and unacceptable.” <p class="paywall">On top of all these alleged transgressions, He may have committed one more: the unauthorized use of Crispr components intended only for research purposes. According to the consent form he gave to potential parents, He’s team was using materials purchased from two American biotechnology companies to make edits to human embryos bound for implantation. The documents named Massachusetts-based Thermo Fisher Scientific as the supplier of Cas9—the bacterial protein that clamps onto DNA and delivers a double-stranded slice—and Bay Area startup Synthego as the maker of its synthetic guide RNA. If gene editing were a butcher shop, Thermo Fisher would craft the knives and Synthego would instruct on which cuts to make.</p> <p class="paywall">He may have spent the last two years working in secret, but he hasn’t been working in a void. American Crispr companies, many of them founded or advised by the field’s biggest stars, have also been hard at work to lower the costs and labor associated with gene editing. Their mission is to make Crispr accessible to everyone. And now they’re getting a lesson in what democratization of that technology really looks like.</p> <p class="paywall">“The difficult thing is that when materials leave our hands and they’re in someone else’s hands, there’s no way of ultimately controlling it,” says Paul Dabrowski, who co-founded Synthego in 2012 with his brother Michael. Back then, Doudna and Charpentier, along with fellow gene editing pioneer Feng Zhang, had just introduced the world to what was possible with Crispr—faster and easier genome manipulation than ever before. But Silicon Valley technologists like the Dabrowskis (who formerly worked as rocket engineers at SpaceX) looked at all that micropipetting and lines of hand-typed genetic code and saw an opportunity to go even faster.</p> <p class="paywall">They started Synthego to bring the best of Moore’s Law—miniaturization, automation, parallelization—to gene editing. By adding in some slick software and artificially intelligent design, Synthego made ordering Crispr constructs to target any human gene a matter of a few clicks, a few hundred dollars, and waiting for the FedEx driver to show up at your door.</p> <p class="paywall">When Doudna joined Synthego’s advisory board earlier this year, she described it as an essential company, one that was "poised to transform the industry by making the application of Crispr simpler, faster, and more valuable to innovators previously unable to realize its full potential,” she <a href="https://www.synthego.com/blog/synthego-crispr-jennifer-doudna-advisory-board" target="_blank" rel="noopener">said</a> in a press release at the time.</p> <p class="paywall">Of course, He’s team could have obtained Crispr components elsewhere or made them from scratch <a href="https://apnews.com/4997bb7aa36c45449b488e19ac83e86d" target="_blank" rel="noopener">in his lab</a> at Southern University of Science and Technology, in Shenzhen. But both time and money were of the essence in He’s race to make biological history.</p> <p class="paywall">At the Second International Summit on Human Genome Editing, held this week in Hong Kong, He said that he personally was covering patient medical care and experiment expenses, without funding from either of his companies or the university. And He, who trained as a biophysicist, isn’t regarded as a Crispr expert. Ordering components from a company that guarantees high editing efficiency—Synthego’s press material claims to put “high-quality gene editing results within reach of all Crispr researchers”—would have made a lot of sense for someone with more ambition than experience.</p> <p class="paywall">Synthego acknowledged to WIRED that its synthetic RNAs may have been used in He’s human embryonic engineering experiment. And that any clinical use of its products explicitly violates both the product labeling and the company’s terms of sale, which state in all caps, “FOR RESEARCH USE ONLY, AND NOT FOR HUMAN OR ANIMAL THERAPEUTIC OR DIAGNOSTIC USE.” In response to the revelations of the past few days, Synthego says it is now re-evaluating its ordering and customer screening processes.</p> <p class="paywall">Currently, it employs a two-step system. The first is an automated university email authentication, followed by a manual evaluation of the purchaser’s scientific resume and publications, to determine if they have a legitimate research history. Neither would likely have flagged He’s project, given that he held a post at Southern University of Science and Technology and had a solid publication record—though mostly in the adjacent field of single-cell sequencing.</p> <p class="paywall">Dabrowski says it’s too soon to say what future precautions the company will employ. But he’s interested in borrowing some lessons from other industries that bank ontrust. In the same way Lyft and Uber built trust among drivers and riders with its star rating scheme, maybe there’s a transparent credit system for scientists that could offer additional screening. “I don’t know if this is a solvable problem,” says Dabrowski. “But if it is, it’s going to take everyone working together, the whole research ecosystem.”</p> <p class="paywall">That ecosystem includes other companies. With licenses to foundational Crispr patents from Zhang, Doudna, and Charpentier’s work, Thermo Fisher is an industry-leading gene editing supply company. Besides Crispr proteins, guides, and design tools, it offers hands-on training courses and a free webinar series called “Master the Art of Crispr Editing” in English, Mandarin, and Korean. Thermo Fisher did not respond to WIRED’s questions by the time of publication.</p> <p class="paywall">A global consensus wasn’t enough to stop one rogue scientist from bringing Crispr babies into the world. Science, as a self-regulating enterprise, failed. If the goal for the time being is total enforcement of the technology, the burden is going to have to be shared by industry as well.</p> </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/us-biotech-firms-made-chinas-gene-edited-babies-possible-1007.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":[""],"tags":["technology","news"],"original_link":"https://hackhex.com/computer/us-biotech-firms-made-chinas-gene-edited-babies-possible-1007.html"}
Transaction InfoBlock #28160077/Trx 87f048c5857f5e04215e80ebbd9bc155f116b57a
View Raw JSON Data
{
  "trx_id": "87f048c5857f5e04215e80ebbd9bc155f116b57a",
  "block": 28160077,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-30T18:18:57",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "usbiotechfirmsmadechinasgene-editedbabiespossible-aawzir1t14",
      "title": "US Biotech Firms Made China's Gene-Edited Babies Possible",
      "body": "<div>\r\n\r\nIn 2015, the 12-person organizing committee of the first International Summit on Human Gene Editing—which included Crispr co-inventors Jennifer Doudna and Emmanuelle Charpentier—issued a statement on how the world should responsibly push forward the science of permanently altering the DNA of <em>Homo sapiens</em>. Combined with other changes that had sprung biology free from the ivory tower, the concern was that someone with a modicum of expertise would go rogue and start a Crispr-It-Yourself baby project.\r\n\r\nOnly three years later, we now know that someone is named He Jiankui. On Wednesday, the Chinese-born, American-trained scientist shared details of the first such experiment, in which He claims to have Crispr’d a pair of twin girls and implanted one additional edited embryo in a woman’s womb. The news was met with nearly universal condemnation from the world’s scientists. Chinese government authorities ordered an investigation, <a href=\"https://www.cnn.com/2018/11/29/health/china-gene-editing-he-jiankui-intl/index.html\" target=\"_blank\" rel=\"noopener\">calling</a> it a brazen violation of Chinese law and a breach of an ethical bottom line, “which is both shocking and unacceptable.”\r\n<p class=\"paywall\">On top of all these alleged transgressions, He may have committed one more: the unauthorized use of Crispr components intended only for research purposes. According to the consent form he gave to potential parents, He’s team was using materials purchased from two American biotechnology companies to make edits to human embryos bound for implantation. The documents named Massachusetts-based Thermo Fisher Scientific as the supplier of Cas9—the bacterial protein that clamps onto DNA and delivers a double-stranded slice—and Bay Area startup Synthego as the maker of its synthetic guide RNA. If gene editing were a butcher shop, Thermo Fisher would craft the knives and Synthego would instruct on which cuts to make.</p>\r\n<p class=\"paywall\">He may have spent the last two years working in secret, but he hasn’t been working in a void. American Crispr companies, many of them founded or advised by the field’s biggest stars, have also been hard at work to lower the costs and labor associated with gene editing. Their mission is to make Crispr accessible to everyone. And now they’re getting a lesson in what democratization of that technology really looks like.</p>\r\n<p class=\"paywall\">“The difficult thing is that when materials leave our hands and they’re in someone else’s hands, there’s no way of ultimately controlling it,” says Paul Dabrowski, who co-founded Synthego in 2012 with his brother Michael. Back then, Doudna and Charpentier, along with fellow gene editing pioneer Feng Zhang, had just introduced the world to what was possible with Crispr—faster and easier genome manipulation than ever before. But Silicon Valley technologists like the Dabrowskis (who formerly worked as rocket engineers at SpaceX) looked at all that micropipetting and lines of hand-typed genetic code and saw an opportunity to go even faster.</p>\r\n<p class=\"paywall\">They started Synthego to bring the best of Moore’s Law—miniaturization, automation, parallelization—to gene editing. By adding in some slick software and artificially intelligent design, Synthego made ordering Crispr constructs to target any human gene a matter of a few clicks, a few hundred dollars, and waiting for the FedEx driver to show up at your door.</p>\r\n<p class=\"paywall\">When Doudna joined Synthego’s advisory board earlier this year, she described it as an essential company, one that was \"poised to transform the industry by making the application of Crispr simpler, faster, and more valuable to innovators previously unable to realize its full potential,” she <a href=\"https://www.synthego.com/blog/synthego-crispr-jennifer-doudna-advisory-board\" target=\"_blank\" rel=\"noopener\">said</a> in a press release at the time.</p>\r\n<p class=\"paywall\">Of course, He’s team could have obtained Crispr components elsewhere or made them from scratch <a href=\"https://apnews.com/4997bb7aa36c45449b488e19ac83e86d\" target=\"_blank\" rel=\"noopener\">in his lab</a> at Southern University of Science and Technology, in Shenzhen. But both time and money were of the essence in He’s race to make biological history.</p>\r\n<p class=\"paywall\">At the Second International Summit on Human Genome Editing, held this week in Hong Kong, He said that he personally was covering patient medical care and experiment expenses, without funding from either of his companies or the university. And He, who trained as a biophysicist, isn’t regarded as a Crispr expert. Ordering components from a company that guarantees high editing efficiency—Synthego’s press material claims to put “high-quality gene editing results within reach of all Crispr researchers”—would have made a lot of sense for someone with more ambition than experience.</p>\r\n<p class=\"paywall\">Synthego acknowledged to WIRED that its synthetic RNAs may have been used in He’s human embryonic engineering experiment. And that any clinical use of its products explicitly violates both the product labeling and the company’s terms of sale, which state in all caps, “FOR RESEARCH USE ONLY, AND NOT FOR HUMAN OR ANIMAL THERAPEUTIC OR DIAGNOSTIC USE.” In response to the revelations of the past few days, Synthego says it is now re-evaluating its ordering and customer screening processes.</p>\r\n<p class=\"paywall\">Currently, it employs a two-step system. The first is an automated university email authentication, followed by a manual evaluation of the purchaser’s scientific resume and publications, to determine if they have a legitimate research history. Neither would likely have flagged He’s project, given that he held a post at Southern University of Science and Technology and had a solid publication record—though mostly in the adjacent field of single-cell sequencing.</p>\r\n<p class=\"paywall\">Dabrowski says it’s too soon to say what future precautions the company will employ. But he’s interested in borrowing some lessons from other industries that bank ontrust. In the same way Lyft and Uber built trust among drivers and riders with its star rating scheme, maybe there’s a transparent credit system for scientists that could offer additional screening. “I don’t know if this is a solvable problem,” says Dabrowski. “But if it is, it’s going to take everyone working together, the whole research ecosystem.”</p>\r\n<p class=\"paywall\">That ecosystem includes other companies. With licenses to foundational Crispr patents from Zhang, Doudna, and Charpentier’s work, Thermo Fisher is an industry-leading gene editing supply company. Besides Crispr proteins, guides, and design tools, it offers hands-on training courses and a free webinar series called “Master the Art of Crispr Editing” in English, Mandarin, and Korean. Thermo Fisher did not respond to WIRED’s questions by the time of publication.</p>\r\n<p class=\"paywall\">A global consensus wasn’t enough to stop one rogue scientist from bringing Crispr babies into the world. Science, as a self-regulating enterprise, failed. If the goal for the time being is total enforcement of the technology, the burden is going to have to be shared by industry as well.</p>\r\n\r\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/us-biotech-firms-made-chinas-gene-edited-babies-possible-1007.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"\"],\"tags\":[\"technology\",\"news\"],\"original_link\":\"https://hackhex.com/computer/us-biotech-firms-made-chinas-gene-edited-babies-possible-1007.html\"}"
    }
  ]
}
2018/11/29 16:16:48
parent authoravalerion
parent permlinkhowtowatchthemacysthanksgivingdayparadeontvandonline-q94lo7f1zv
authorsteemcleaners
permlinkre-avalerion-howtowatchthemacysthanksgivingdayparadeontvandonline-q94lo7f1zv-20181129t161646223z
title
body[Source](https://www.wired.com/story/how-to-watch-macys-thanksgiving-day-parade/) [Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah). [More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/) If you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)
json metadata{"app":"steemcleaners/0.3","format":"markdown+html","community":"steemcleaners"}
Transaction InfoBlock #28128846/Trx f0bdf76be33cf1accef1e43505e80003dda18d9e
View Raw JSON Data
{
  "trx_id": "f0bdf76be33cf1accef1e43505e80003dda18d9e",
  "block": 28128846,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-29T16:16:48",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "howtowatchthemacysthanksgivingdayparadeontvandonline-q94lo7f1zv",
      "author": "steemcleaners",
      "permlink": "re-avalerion-howtowatchthemacysthanksgivingdayparadeontvandonline-q94lo7f1zv-20181129t161646223z",
      "title": "",
      "body": "[Source](https://www.wired.com/story/how-to-watch-macys-thanksgiving-day-parade/)\n[Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. \r\n\r\nSpam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah).\r\n\r\n[More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/)\r\n\r\nIf you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)",
      "json_metadata": "{\"app\":\"steemcleaners/0.3\",\"format\":\"markdown+html\",\"community\":\"steemcleaners\"}"
    }
  ]
}
2018/11/29 16:12:09
parent authoravalerion
parent permlinktalktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6
authorsteemcleaners
permlinkre-avalerion-talktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6-20181129t161207585z
title
body[Source](https://hacknews.co/data-breaches/20181120/two-talktalk-hackers-jailed-for-2015-data-breach-that-cost-it-77-million.html) [Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah). [More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/) If you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)
json metadata{"app":"steemcleaners/0.3","format":"markdown+html","community":"steemcleaners"}
Transaction InfoBlock #28128753/Trx 7fb8742c43a7f00ca34787000e8acc4e88a6a776
View Raw JSON Data
{
  "trx_id": "7fb8742c43a7f00ca34787000e8acc4e88a6a776",
  "block": 28128753,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-29T16:12:09",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "talktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6",
      "author": "steemcleaners",
      "permlink": "re-avalerion-talktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6-20181129t161207585z",
      "title": "",
      "body": "[Source](https://hacknews.co/data-breaches/20181120/two-talktalk-hackers-jailed-for-2015-data-breach-that-cost-it-77-million.html)\n[Plagiarism](http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/) is the copying & pasting of others work without giving credit to the original author or artist. Plagiarized posts are considered spam. \r\n\r\nSpam is discouraged by the community, and may result in action from the [cheetah bot](https://steemit.com/faq.html#What_is__cheetah).\r\n\r\n[More information and tips on sharing content.](https://steemcleaners.org/copy-paste-plagiarism/)\r\n\r\nIf you believe this comment is in error, please contact us in [#disputes on Discord](https://discord.gg/YR2Wy5A)",
      "json_metadata": "{\"app\":\"steemcleaners/0.3\",\"format\":\"markdown+html\",\"community\":\"steemcleaners\"}"
    }
  ]
}
2018/11/29 14:36:15
voteravalerion
authorbronsonhill
permlinkhow-to-earn-money-from-upvoting
weight10000 (100.00%)
Transaction InfoBlock #28126838/Trx 07fbe1a612ffd3b5ab88c84f201ac2076bdec06b
View Raw JSON Data
{
  "trx_id": "07fbe1a612ffd3b5ab88c84f201ac2076bdec06b",
  "block": 28126838,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-29T14:36:15",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "bronsonhill",
      "permlink": "how-to-earn-money-from-upvoting",
      "weight": 10000
    }
  ]
}
2018/11/29 14:18:36
parent authoravalerion
parent permlinkdellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86
authorcheetah
permlinkcheetah-re-avaleriondellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://hacknews.co/data-breaches/20181129/dell-resets-all-customers-passwords-after-potential-security-breach.html
json metadata
Transaction InfoBlock #28126485/Trx 3a09ee96337d4abdb72caa9fac10e8e7fcdef011
View Raw JSON Data
{
  "trx_id": "3a09ee96337d4abdb72caa9fac10e8e7fcdef011",
  "block": 28126485,
  "trx_in_block": 10,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-29T14:18:36",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "dellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86",
      "author": "cheetah",
      "permlink": "cheetah-re-avaleriondellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://hacknews.co/data-breaches/20181129/dell-resets-all-customers-passwords-after-potential-security-breach.html",
      "json_metadata": ""
    }
  ]
}
2018/11/29 14:18:30
votercheetah
authoravalerion
permlinkdellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86
weight8 (0.08%)
Transaction InfoBlock #28126483/Trx fd0dc997ed63e30c4e60d9e4df7eeff8bd864166
View Raw JSON Data
{
  "trx_id": "fd0dc997ed63e30c4e60d9e4df7eeff8bd864166",
  "block": 28126483,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-29T14:18:30",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "dellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86",
      "weight": 8
    }
  ]
}
2018/11/29 14:18:12
voteravalerion
authoravalerion
permlinkdellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86
weight10000 (100.00%)
Transaction InfoBlock #28126477/Trx cb8b694279e38c88704fd7998f25876123c4998e
View Raw JSON Data
{
  "trx_id": "cb8b694279e38c88704fd7998f25876123c4998e",
  "block": 28126477,
  "trx_in_block": 28,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-29T14:18:12",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "dellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86",
      "weight": 10000
    }
  ]
}
2018/11/29 14:18:12
authoravalerion
permlinkdellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #28126477/Trx cb8b694279e38c88704fd7998f25876123c4998e
View Raw JSON Data
{
  "trx_id": "cb8b694279e38c88704fd7998f25876123c4998e",
  "block": 28126477,
  "trx_in_block": 28,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-29T14:18:12",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "dellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/11/29 14:18:12
parent author
parent permlinktechnology
authoravalerion
permlinkdellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86
titleDell Has Reset All Its Customers' Passwords After Security Breach
body<center>https://hackhex.com/wp-content/uploads/2018/11/1543471868_Dell-Resets-All-Customers-Passwords-After-Potential-Security-Breach.png</center> <br/><div id="articlebody"> Multinational computer technology company Dell disclosed Wednesday that its online electronics marketplace experienced a "cybersecurity incident" earlier this month when an unknown group of hackers infiltrated its internal network. On November 9, Dell detected and disrupted unauthorized activity on its network attempting to steal customer information, including their names, email addresses and hashed passwords. According to the company, the initial investigation found no conclusive evidence that the hackers succeeded to extract any information, but as a countermeasure Dell has reset passwords for all accounts on Dell.com website whether the data had been stolen or not. Dell did not share any information on how hackers managed to infiltrate its network at the first place or how many user accounts were affected, but the company did confirm that payment information and Social Security numbers were not targeted. "Credit card and other sensitive customer information were not targeted. The incident did not impact any Dell products or services," Dell <a href="https://www.dell.com/learn/us/en/uscorp1/press-releases/2018-11-28-customer-update" target="_blank" rel="noopener">says</a>. You are affected if you have ever created an account on the Dell website to purchase any of their products or to access the online support. <blockquote class="tr_bq">"Upon detection of the attempted extraction, Dell immediately implemented countermeasures and initiated an investigation. Dell also retained a digital forensics firm to conduct an independent investigation and has engaged law enforcement," the company said. </blockquote> We will update this story as more information becomes available. </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/dell-has-reset-all-its-customers-passwords-after-security-breach-928.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/11/1543471868_Dell-Resets-All-Customers-Passwords-After-Potential-Security-Breach.png"],"tags":["technology","news","cyberattack","databreach","dellcomputers"],"original_link":"https://hackhex.com/computer/dell-has-reset-all-its-customers-passwords-after-security-breach-928.html"}
Transaction InfoBlock #28126477/Trx cb8b694279e38c88704fd7998f25876123c4998e
View Raw JSON Data
{
  "trx_id": "cb8b694279e38c88704fd7998f25876123c4998e",
  "block": 28126477,
  "trx_in_block": 28,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-29T14:18:12",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "dellhasresetallitscustomerspasswordsaftersecuritybreach-wp9kwrbz86",
      "title": "Dell Has Reset All Its Customers' Passwords After Security Breach",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/11/1543471868_Dell-Resets-All-Customers-Passwords-After-Potential-Security-Breach.png</center> <br/><div id=\"articlebody\">\n\nMultinational computer technology company Dell disclosed Wednesday that its online electronics marketplace experienced a \"cybersecurity incident\" earlier this month when an unknown group of hackers infiltrated its internal network.\n\nOn November 9, Dell detected and disrupted unauthorized activity on its network attempting to steal customer information, including their names, email addresses and hashed passwords.\n\nAccording to the company, the initial investigation found no conclusive evidence that the hackers succeeded to extract any information, but as a countermeasure Dell has reset passwords for all accounts on Dell.com website whether the data had been stolen or not.\n\nDell did not share any information on how hackers managed to infiltrate its network at the first place or how many user accounts were affected, but the company did confirm that payment information and Social Security numbers were not targeted.\n\n\"Credit card and other sensitive customer information were not targeted. The incident did not impact any Dell products or services,\" Dell <a href=\"https://www.dell.com/learn/us/en/uscorp1/press-releases/2018-11-28-customer-update\" target=\"_blank\" rel=\"noopener\">says</a>.\n\nYou are affected if you have ever created an account on the Dell website to purchase any of their products or to access the online support.\n<blockquote class=\"tr_bq\">\"Upon detection of the attempted extraction, Dell immediately implemented countermeasures and initiated an investigation. Dell also retained a digital forensics firm to conduct an independent investigation and has engaged law enforcement,\" the company said.\n</blockquote>\nWe will update this story as more information becomes available.\n\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/dell-has-reset-all-its-customers-passwords-after-security-breach-928.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/11/1543471868_Dell-Resets-All-Customers-Passwords-After-Potential-Security-Breach.png\"],\"tags\":[\"technology\",\"news\",\"cyberattack\",\"databreach\",\"dellcomputers\"],\"original_link\":\"https://hackhex.com/computer/dell-has-reset-all-its-customers-passwords-after-security-breach-928.html\"}"
    }
  ]
}
2018/11/27 10:34:51
parent author
parent permlinktechnology
authoravalerion
permlinkroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm
titleRogue Developer Infects NodeJS Module to Steal Bitcoins
body<center>https://hackhex.com/wp-content/uploads/2018/11/1543307557_Rogue-Developer-Infects-Widely-Used-NodeJS-Module-to-Steal-Bitcoins.jpg</center> <br/><div id="articlebody"> <div dir="ltr" style="text-align: left;"> A widely used third-party NodeJS module with nearly 2 million downloads a week was compromised after one of its open-source contributor gone rogue, who infected it with a malicious code that was programmed to steal funds stored in Bitcoin wallet apps. The Node.js library in question is "Event-Stream," a toolkit that makes it easy for developers to create and work with streams, a collection of data in Node.js — just like arrays or strings. The malicious code detected earlier this week was added to Event-Stream version 3.3.6, published on September 9 via <a href="https://www.npmjs.com/package/event-stream" target="_blank" rel="noopener">NPM repository</a>, and had since been downloaded by nearly 8 million application programmers. Event-Stream module for Node.js was originally created by Dominic Tarr, who maintained the Event-Stream library for a long time, but <a href="https://github.com/dominictarr/event-stream/issues/116#issuecomment-440927400" target="_blank" rel="noopener">handed over</a> the development and maintenance of the project several months ago to an unknown programmer, called "right9ctrl." Apparently, right9ctrl gained Dominic's trust by making some meaningful contributions to the project. After gaining access to the library, the new rightful maintainer "Right9ctrl" released Event-Stream version 3.3.6, containing a new library, called Flatmap-Stream, as a dependency, which was specifically crafted for the purposes of this attack and includes the malicious code. Since the flatmap-stream module was encrypted, the malicious code remained undetected for more than 2 months until Ayrton Sparling (FallingSnow), a computer science student at California State University, flagged the issue Tuesday on <a href="https://github.com/dominictarr/event-stream/issues/116" target="_blank" rel="noopener">GitHub</a>. After analyzing the obfuscated code and encrypted payload, open source project manager NPM which hosted event-stream found that the malicious module has been designed to target people using BitPay's open-source bitcoin wallet app, Copay, a company that incorporated event-stream into its app. The malicious code attempted to steal digital coins stored in the Dash Copay Bitcoin wallets—distributed through the Node Package Manager (NPM)—and transfer them to a server located in Kuala Lumpur. Officials from NPM—the open source project manager that hosted event-stream code library—removed the backdoor from <a href="https://github.com/hugeglass/flatmap-stream/issues/2" target="_blank" rel="noopener">NPM's listing</a> on Monday this week. BitPay also published an advisory saying Copay versions 5.0.2 through 5.1.0 were affected by the malicious code and that users with these versions installed should avoid running or opening the app until they install Copay version 5.2.0. <blockquote class="tr_bq">"Users should assume that private keys on affected wallets may have been compromised, so they should move funds to new wallets (v5.2.0) immediately," BitPay says in the <a href="https://blog.bitpay.com/npm-package-vulnerability-copay/" target="_blank" rel="noopener">advisory</a>." </blockquote> <blockquote class="tr_bq">Users should first update their affected wallets (5.0.2-5.1.0) and then send all funds from affected wallets to a brand new wallet on version 5.2.0, using the Send Max feature to initiate transactions of all funds." </blockquote> BitPay also says that its team continues to investigate this issue and the extent of the vulnerability to know whether the malicious code was ever exploited against Copay users. BitPay assures its users that the BitPay app was not vulnerable to the malicious code. </div> </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/rogue-developer-infects-nodejs-module-to-steal-bitcoins-812.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/11/1543307557_Rogue-Developer-Infects-Widely-Used-NodeJS-Module-to-Steal-Bitcoins.jpg"],"tags":["technology","news","bitcoinwallet","cyberattack","event-stream"],"original_link":"https://hackhex.com/computer/rogue-developer-infects-nodejs-module-to-steal-bitcoins-812.html"}
Transaction InfoBlock #28064425/Trx 8b9e5e8afa4c5ddfeaecf6ca869ecddc808ad4e1
View Raw JSON Data
{
  "trx_id": "8b9e5e8afa4c5ddfeaecf6ca869ecddc808ad4e1",
  "block": 28064425,
  "trx_in_block": 10,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-27T10:34:51",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "roguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm",
      "title": "Rogue Developer Infects NodeJS Module to Steal Bitcoins",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/11/1543307557_Rogue-Developer-Infects-Widely-Used-NodeJS-Module-to-Steal-Bitcoins.jpg</center> <br/><div id=\"articlebody\">\n<div dir=\"ltr\" style=\"text-align: left;\">\n\nA widely used third-party NodeJS module with nearly 2 million downloads a week was compromised after one of its open-source contributor gone rogue, who infected it with a malicious code that was programmed to steal funds stored in Bitcoin wallet apps.\n\nThe Node.js library in question is \"Event-Stream,\" a toolkit that makes it easy for developers to create and work with streams, a collection of data in Node.js — just like arrays or strings.\n\nThe malicious code detected earlier this week was added to Event-Stream version 3.3.6, published on September 9 via <a href=\"https://www.npmjs.com/package/event-stream\" target=\"_blank\" rel=\"noopener\">NPM repository</a>, and had since been downloaded by nearly 8 million application programmers.\n\nEvent-Stream module for Node.js was originally created by Dominic Tarr, who maintained the Event-Stream library for a long time, but <a href=\"https://github.com/dominictarr/event-stream/issues/116#issuecomment-440927400\" target=\"_blank\" rel=\"noopener\">handed over</a> the development and maintenance of the project several months ago to an unknown programmer, called \"right9ctrl.\"\n\nApparently, right9ctrl gained Dominic's trust by making some meaningful contributions to the project.\n\nAfter gaining access to the library, the new rightful maintainer \"Right9ctrl\" released Event-Stream version 3.3.6, containing a new library, called Flatmap-Stream, as a dependency, which was specifically crafted for the purposes of this attack and includes the malicious code.\n\nSince the flatmap-stream module was encrypted, the malicious code remained undetected for more than 2 months until Ayrton Sparling (FallingSnow), a computer science student at California State University, flagged the issue Tuesday on <a href=\"https://github.com/dominictarr/event-stream/issues/116\" target=\"_blank\" rel=\"noopener\">GitHub</a>.\n\nAfter analyzing the obfuscated code and encrypted payload, open source project manager NPM which hosted event-stream found that the malicious module has been designed to target people using BitPay's open-source bitcoin wallet app, Copay, a company that incorporated event-stream into its app.\n\nThe malicious code attempted to steal digital coins stored in the Dash Copay Bitcoin wallets—distributed through the Node Package Manager (NPM)—and transfer them to a server located in Kuala Lumpur.\n\nOfficials from NPM—the open source project manager that hosted event-stream code library—removed the backdoor from <a href=\"https://github.com/hugeglass/flatmap-stream/issues/2\" target=\"_blank\" rel=\"noopener\">NPM's listing</a> on Monday this week.\n\nBitPay also published an advisory saying Copay versions 5.0.2 through 5.1.0 were affected by the malicious code and that users with these versions installed should avoid running or opening the app until they install Copay version 5.2.0.\n<blockquote class=\"tr_bq\">\"Users should assume that private keys on affected wallets may have been compromised, so they should move funds to new wallets (v5.2.0) immediately,\" BitPay says in the <a href=\"https://blog.bitpay.com/npm-package-vulnerability-copay/\" target=\"_blank\" rel=\"noopener\">advisory</a>.\"\n</blockquote>\n<blockquote class=\"tr_bq\">Users should first update their affected wallets (5.0.2-5.1.0) and then send all funds from affected wallets to a brand new wallet on version 5.2.0, using the Send Max feature to initiate transactions of all funds.\"\n</blockquote>\nBitPay also says that its team continues to investigate this issue and the extent of the vulnerability to know whether the malicious code was ever exploited against Copay users.\n\nBitPay assures its users that the BitPay app was not vulnerable to the malicious code.\n\n</div>\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/rogue-developer-infects-nodejs-module-to-steal-bitcoins-812.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/11/1543307557_Rogue-Developer-Infects-Widely-Used-NodeJS-Module-to-Steal-Bitcoins.jpg\"],\"tags\":[\"technology\",\"news\",\"bitcoinwallet\",\"cyberattack\",\"event-stream\"],\"original_link\":\"https://hackhex.com/computer/rogue-developer-infects-nodejs-module-to-steal-bitcoins-812.html\"}"
    }
  ]
}
2018/11/27 10:33:15
votermikedynamo
authoravalerion
permlinkroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm
weight10000 (100.00%)
Transaction InfoBlock #28064393/Trx 0c732a73e864ea9dd9f2aa4ee1ac67dd1a412e5f
View Raw JSON Data
{
  "trx_id": "0c732a73e864ea9dd9f2aa4ee1ac67dd1a412e5f",
  "block": 28064393,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-27T10:33:15",
  "op": [
    "vote",
    {
      "voter": "mikedynamo",
      "author": "avalerion",
      "permlink": "roguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm",
      "weight": 10000
    }
  ]
}
2018/11/27 10:32:30
parent authoravalerion
parent permlinkroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm
authorcheetah
permlinkcheetah-re-avalerionroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://hacknews.co/malware/20181127/rogue-developer-infects-widely-used-nodejs-module-to-steal-bitcoins.html
json metadata
Transaction InfoBlock #28064378/Trx d7deedad72c7c673e23af0849cfc8a47ffe44a2c
View Raw JSON Data
{
  "trx_id": "d7deedad72c7c673e23af0849cfc8a47ffe44a2c",
  "block": 28064378,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-27T10:32:30",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "roguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm",
      "author": "cheetah",
      "permlink": "cheetah-re-avalerionroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://hacknews.co/malware/20181127/rogue-developer-infects-widely-used-nodejs-module-to-steal-bitcoins.html",
      "json_metadata": ""
    }
  ]
}
2018/11/27 10:32:24
votercheetah
authoravalerion
permlinkroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm
weight8 (0.08%)
Transaction InfoBlock #28064376/Trx a23fa3aaad9dc6f31e4c0a10939b0890a272ade6
View Raw JSON Data
{
  "trx_id": "a23fa3aaad9dc6f31e4c0a10939b0890a272ade6",
  "block": 28064376,
  "trx_in_block": 19,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-27T10:32:24",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "roguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm",
      "weight": 8
    }
  ]
}
2018/11/27 10:32:12
voteravalerion
authoravalerion
permlinkroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm
weight10000 (100.00%)
Transaction InfoBlock #28064372/Trx cb5c0633adcc272259b5cc1aff59f888efab45f5
View Raw JSON Data
{
  "trx_id": "cb5c0633adcc272259b5cc1aff59f888efab45f5",
  "block": 28064372,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-27T10:32:12",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "roguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm",
      "weight": 10000
    }
  ]
}
2018/11/27 10:32:12
authoravalerion
permlinkroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #28064372/Trx cb5c0633adcc272259b5cc1aff59f888efab45f5
View Raw JSON Data
{
  "trx_id": "cb5c0633adcc272259b5cc1aff59f888efab45f5",
  "block": 28064372,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-27T10:32:12",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "roguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/11/27 10:32:12
parent author
parent permlinktechnology
authoravalerion
permlinkroguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm
titleRogue Developer Infects NodeJS Module to Steal Bitcoins
body<center>https://hackhex.com/wp-content/uploads/2018/11/1543307557_Rogue-Developer-Infects-Widely-Used-NodeJS-Module-to-Steal-Bitcoins.jpg</center> <br/><div id="articlebody"> <div dir="ltr" style="text-align: left;"> A widely used third-party NodeJS module with nearly 2 million downloads a week was compromised after one of its open-source contributor gone rogue, who infected it with a malicious code that was programmed to steal funds stored in Bitcoin wallet apps. The Node.js library in question is "Event-Stream," a toolkit that makes it easy for developers to create and work with streams, a collection of data in Node.js — just like arrays or strings. The malicious code detected earlier this week was added to Event-Stream version 3.3.6, published on September 9 via <a href="https://www.npmjs.com/package/event-stream" target="_blank" rel="noopener">NPM repository</a>, and had since been downloaded by nearly 8 million application programmers. Event-Stream module for Node.js was originally created by Dominic Tarr, who maintained the Event-Stream library for a long time, but <a href="https://github.com/dominictarr/event-stream/issues/116#issuecomment-440927400" target="_blank" rel="noopener">handed over</a> the development and maintenance of the project several months ago to an unknown programmer, called "right9ctrl." Apparently, right9ctrl gained Dominic's trust by making some meaningful contributions to the project. After gaining access to the library, the new rightful maintainer "Right9ctrl" released Event-Stream version 3.3.6, containing a new library, called Flatmap-Stream, as a dependency, which was specifically crafted for the purposes of this attack and includes the malicious code. Since the flatmap-stream module was encrypted, the malicious code remained undetected for more than 2 months until Ayrton Sparling (FallingSnow), a computer science student at California State University, flagged the issue Tuesday on <a href="https://github.com/dominictarr/event-stream/issues/116" target="_blank" rel="noopener">GitHub</a>. After analyzing the obfuscated code and encrypted payload, open source project manager NPM which hosted event-stream found that the malicious module has been designed to target people using BitPay's open-source bitcoin wallet app, Copay, a company that incorporated event-stream into its app. The malicious code attempted to steal digital coins stored in the Dash Copay Bitcoin wallets—distributed through the Node Package Manager (NPM)—and transfer them to a server located in Kuala Lumpur. Officials from NPM—the open source project manager that hosted event-stream code library—removed the backdoor from <a href="https://github.com/hugeglass/flatmap-stream/issues/2" target="_blank" rel="noopener">NPM's listing</a> on Monday this week. BitPay also published an advisory saying Copay versions 5.0.2 through 5.1.0 were affected by the malicious code and that users with these versions installed should avoid running or opening the app until they install Copay version 5.2.0. <blockquote class="tr_bq">"Users should assume that private keys on affected wallets may have been compromised, so they should move funds to new wallets (v5.2.0) immediately," BitPay says in the <a href="https://blog.bitpay.com/npm-package-vulnerability-copay/" target="_blank" rel="noopener">advisory</a>."Users should first update their affected wallets (5.0.2-5.1.0) and then send all funds from affected wallets to a brand new wallet on version 5.2.0, using the Send Max feature to initiate transactions of all funds." </blockquote> BitPay also says that its team continues to investigate this issue and the extent of the vulnerability to know whether the malicious code was ever exploited against Copay users. BitPay assures its users that the BitPay app was not vulnerable to the malicious code. </div> </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/rogue-developer-infects-nodejs-module-to-steal-bitcoins-812.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/11/1543307557_Rogue-Developer-Infects-Widely-Used-NodeJS-Module-to-Steal-Bitcoins.jpg"],"tags":["technology","news","bitcoinwallet","cyberattack","event-stream"],"original_link":"https://hackhex.com/computer/rogue-developer-infects-nodejs-module-to-steal-bitcoins-812.html"}
Transaction InfoBlock #28064372/Trx cb5c0633adcc272259b5cc1aff59f888efab45f5
View Raw JSON Data
{
  "trx_id": "cb5c0633adcc272259b5cc1aff59f888efab45f5",
  "block": 28064372,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-27T10:32:12",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "roguedeveloperinfectsnodejsmoduletostealbitcoins-dw6vrkrylm",
      "title": "Rogue Developer Infects NodeJS Module to Steal Bitcoins",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/11/1543307557_Rogue-Developer-Infects-Widely-Used-NodeJS-Module-to-Steal-Bitcoins.jpg</center> <br/><div id=\"articlebody\">\n<div dir=\"ltr\" style=\"text-align: left;\">\n\nA widely used third-party NodeJS module with nearly 2 million downloads a week was compromised after one of its open-source contributor gone rogue, who infected it with a malicious code that was programmed to steal funds stored in Bitcoin wallet apps.\n\nThe Node.js library in question is \"Event-Stream,\" a toolkit that makes it easy for developers to create and work with streams, a collection of data in Node.js — just like arrays or strings.\n\nThe malicious code detected earlier this week was added to Event-Stream version 3.3.6, published on September 9 via <a href=\"https://www.npmjs.com/package/event-stream\" target=\"_blank\" rel=\"noopener\">NPM repository</a>, and had since been downloaded by nearly 8 million application programmers.\n\nEvent-Stream module for Node.js was originally created by Dominic Tarr, who maintained the Event-Stream library for a long time, but <a href=\"https://github.com/dominictarr/event-stream/issues/116#issuecomment-440927400\" target=\"_blank\" rel=\"noopener\">handed over</a> the development and maintenance of the project several months ago to an unknown programmer, called \"right9ctrl.\"\n\nApparently, right9ctrl gained Dominic's trust by making some meaningful contributions to the project.\n\nAfter gaining access to the library, the new rightful maintainer \"Right9ctrl\" released Event-Stream version 3.3.6, containing a new library, called Flatmap-Stream, as a dependency, which was specifically crafted for the purposes of this attack and includes the malicious code.\n\nSince the flatmap-stream module was encrypted, the malicious code remained undetected for more than 2 months until Ayrton Sparling (FallingSnow), a computer science student at California State University, flagged the issue Tuesday on <a href=\"https://github.com/dominictarr/event-stream/issues/116\" target=\"_blank\" rel=\"noopener\">GitHub</a>.\n\nAfter analyzing the obfuscated code and encrypted payload, open source project manager NPM which hosted event-stream found that the malicious module has been designed to target people using BitPay's open-source bitcoin wallet app, Copay, a company that incorporated event-stream into its app.\n\nThe malicious code attempted to steal digital coins stored in the Dash Copay Bitcoin wallets—distributed through the Node Package Manager (NPM)—and transfer them to a server located in Kuala Lumpur.\n\nOfficials from NPM—the open source project manager that hosted event-stream code library—removed the backdoor from <a href=\"https://github.com/hugeglass/flatmap-stream/issues/2\" target=\"_blank\" rel=\"noopener\">NPM's listing</a> on Monday this week.\n\nBitPay also published an advisory saying Copay versions 5.0.2 through 5.1.0 were affected by the malicious code and that users with these versions installed should avoid running or opening the app until they install Copay version 5.2.0.\n<blockquote class=\"tr_bq\">\"Users should assume that private keys on affected wallets may have been compromised, so they should move funds to new wallets (v5.2.0) immediately,\" BitPay says in the <a href=\"https://blog.bitpay.com/npm-package-vulnerability-copay/\" target=\"_blank\" rel=\"noopener\">advisory</a>.\"Users should first update their affected wallets (5.0.2-5.1.0) and then send all funds from affected wallets to a brand new wallet on version 5.2.0, using the Send Max feature to initiate transactions of all funds.\"\n</blockquote>\nBitPay also says that its team continues to investigate this issue and the extent of the vulnerability to know whether the malicious code was ever exploited against Copay users.\n\nBitPay assures its users that the BitPay app was not vulnerable to the malicious code.\n\n</div>\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/rogue-developer-infects-nodejs-module-to-steal-bitcoins-812.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/11/1543307557_Rogue-Developer-Infects-Widely-Used-NodeJS-Module-to-Steal-Bitcoins.jpg\"],\"tags\":[\"technology\",\"news\",\"bitcoinwallet\",\"cyberattack\",\"event-stream\"],\"original_link\":\"https://hackhex.com/computer/rogue-developer-infects-nodejs-module-to-steal-bitcoins-812.html\"}"
    }
  ]
}
2018/11/24 17:28:03
voteravalerion
authoravalerion
permlinkhowtowatchthenasainsightmarslanding-yxgie73vwt
weight10000 (100.00%)
Transaction InfoBlock #27986327/Trx f69a46865d09f1c76dacd3b335279b2f4f319ac3
View Raw JSON Data
{
  "trx_id": "f69a46865d09f1c76dacd3b335279b2f4f319ac3",
  "block": 27986327,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-24T17:28:03",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "howtowatchthenasainsightmarslanding-yxgie73vwt",
      "weight": 10000
    }
  ]
}
2018/11/24 17:28:03
authoravalerion
permlinkhowtowatchthenasainsightmarslanding-yxgie73vwt
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #27986327/Trx f69a46865d09f1c76dacd3b335279b2f4f319ac3
View Raw JSON Data
{
  "trx_id": "f69a46865d09f1c76dacd3b335279b2f4f319ac3",
  "block": 27986327,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-24T17:28:03",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "howtowatchthenasainsightmarslanding-yxgie73vwt",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/11/24 17:28:03
parent author
parent permlinktechnology
authoravalerion
permlinkhowtowatchthenasainsightmarslanding-yxgie73vwt
titleHow to Watch the NASA InSight Mars Landing
body<center>https://hackhex.com/wp-content/uploads/2018/11/How-and-Where-to-Watch-the-NASA-InSight-Mars-Landing.jpg</center> <br/><div> On Monday, November 26th, following a six-month journey across hundreds of millions of miles of deep space, NASA's InSight spacecraft will arrive at Mars in suitably dramatic fashion, hitting the top of the planet's atmosphere at 12,300 miles per hour—several times faster than a speeding bullet—shortly before 12:00 pm PST (3:00 pm EST). If all goes as planned, it will take InSight (short for Interior Exploration using Seismic Investigations, Geodesy, and Heat Transport) just seven minutes to decelerate completely and alight on Mars' surface. The planet's atmosphere will do a lot of the work, aided in turn by InSight's parachute, descent thrusters, and shock-absorbing legs. If NASA can pull it off, it will be the agency's eighth successful landing on the red planet. <p class="paywall">NASA and others will be broadcasting news of InSight's approach, entry, descent, and landing all day long. Here are the best places to keep tabs on Monday's proceedings in person and online.</p> <h3 class="paywall">Watch in Person</h3> <p class="paywall">From the NASDAQ Screen in Times Square, to the California Science Center in Los Angeles, to the Max Planck Institute for Solar System Research in Göttingen, Germany, live viewing parties will be taking place all over the world on November 26th. NASA has compiled <a href="https://mars.nasa.gov/insight/timeline/landing/watch-in-person/" target="_blank" rel="noopener">a handy list</a> of no fewer than 80 such events, complete with addresses and contact information. The agency is updating the list daily, so if you don't see anything near you today, be sure to check back in the days ahead. You can also check with your local museum to see if they'll be hosting a landing party. If you've never been to a watch party for a Mars landing, we highly recommend it. After all: They don't happen very often!</p> </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/how-to-watch-the-nasa-insight-mars-landing-676.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/11/How-and-Where-to-Watch-the-NASA-InSight-Mars-Landing.jpg"],"tags":["technology","news","mars","nasa","planetaryscience"],"original_link":"https://hackhex.com/computer/how-to-watch-the-nasa-insight-mars-landing-676.html"}
Transaction InfoBlock #27986327/Trx f69a46865d09f1c76dacd3b335279b2f4f319ac3
View Raw JSON Data
{
  "trx_id": "f69a46865d09f1c76dacd3b335279b2f4f319ac3",
  "block": 27986327,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-24T17:28:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "howtowatchthenasainsightmarslanding-yxgie73vwt",
      "title": "How to Watch the NASA InSight Mars Landing",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/11/How-and-Where-to-Watch-the-NASA-InSight-Mars-Landing.jpg</center> <br/><div>\n\nOn Monday, November 26th, following a six-month journey across hundreds of millions of miles of deep space, NASA's InSight spacecraft will arrive at Mars in suitably dramatic fashion, hitting the top of the planet's atmosphere at 12,300 miles per hour—several times faster than a speeding bullet—shortly before 12:00 pm PST (3:00 pm EST).\n\nIf all goes as planned, it will take InSight (short for Interior Exploration using Seismic Investigations, Geodesy, and Heat Transport) just seven minutes to decelerate completely and alight on Mars' surface. The planet's atmosphere will do a lot of the work, aided in turn by InSight's parachute, descent thrusters, and shock-absorbing legs. If NASA can pull it off, it will be the agency's eighth successful landing on the red planet.\n<p class=\"paywall\">NASA and others will be broadcasting news of InSight's approach, entry, descent, and landing all day long. Here are the best places to keep tabs on Monday's proceedings in person and online.</p>\n\n<h3 class=\"paywall\">Watch in Person</h3>\n<p class=\"paywall\">From the NASDAQ Screen in Times Square, to the California Science Center in Los Angeles, to the Max Planck Institute for Solar System Research in Göttingen, Germany, live viewing parties will be taking place all over the world on November 26th. NASA has compiled <a href=\"https://mars.nasa.gov/insight/timeline/landing/watch-in-person/\" target=\"_blank\" rel=\"noopener\">a handy list</a> of no fewer than 80 such events, complete with addresses and contact information. The agency is updating the list daily, so if you don't see anything near you today, be sure to check back in the days ahead. You can also check with your local museum to see if they'll be hosting a landing party. If you've never been to a watch party for a Mars landing, we highly recommend it. After all: They don't happen very often!</p>\n\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/how-to-watch-the-nasa-insight-mars-landing-676.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/11/How-and-Where-to-Watch-the-NASA-InSight-Mars-Landing.jpg\"],\"tags\":[\"technology\",\"news\",\"mars\",\"nasa\",\"planetaryscience\"],\"original_link\":\"https://hackhex.com/computer/how-to-watch-the-nasa-insight-mars-landing-676.html\"}"
    }
  ]
}
2018/11/23 16:25:54
parent authoravalerion
parent permlinkwoocommercepluginpatchescriticalvulnerability-85f59yxcus
authorcheetah
permlinkcheetah-re-avalerionwoocommercepluginpatchescriticalvulnerability-85f59yxcus
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://thehackernews.com/2018/11/woocommerce-wordpress-hacking.html
json metadata
Transaction InfoBlock #27956320/Trx 8e01e8bb61d7014d2f88dd20de870ceacc485112
View Raw JSON Data
{
  "trx_id": "8e01e8bb61d7014d2f88dd20de870ceacc485112",
  "block": 27956320,
  "trx_in_block": 18,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-23T16:25:54",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "woocommercepluginpatchescriticalvulnerability-85f59yxcus",
      "author": "cheetah",
      "permlink": "cheetah-re-avalerionwoocommercepluginpatchescriticalvulnerability-85f59yxcus",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://thehackernews.com/2018/11/woocommerce-wordpress-hacking.html",
      "json_metadata": ""
    }
  ]
}
2018/11/23 16:25:48
votercheetah
authoravalerion
permlinkwoocommercepluginpatchescriticalvulnerability-85f59yxcus
weight8 (0.08%)
Transaction InfoBlock #27956318/Trx e744a2569edcac1e8719bcd50d764db20592974f
View Raw JSON Data
{
  "trx_id": "e744a2569edcac1e8719bcd50d764db20592974f",
  "block": 27956318,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-23T16:25:48",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "woocommercepluginpatchescriticalvulnerability-85f59yxcus",
      "weight": 8
    }
  ]
}
2018/11/23 16:25:39
voteravalerion
authoravalerion
permlinkwoocommercepluginpatchescriticalvulnerability-85f59yxcus
weight10000 (100.00%)
Transaction InfoBlock #27956315/Trx c3ffd71d1b90d7249286e4feead54a2641149394
View Raw JSON Data
{
  "trx_id": "c3ffd71d1b90d7249286e4feead54a2641149394",
  "block": 27956315,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-23T16:25:39",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "woocommercepluginpatchescriticalvulnerability-85f59yxcus",
      "weight": 10000
    }
  ]
}
2018/11/23 16:25:39
authoravalerion
permlinkwoocommercepluginpatchescriticalvulnerability-85f59yxcus
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #27956315/Trx c3ffd71d1b90d7249286e4feead54a2641149394
View Raw JSON Data
{
  "trx_id": "c3ffd71d1b90d7249286e4feead54a2641149394",
  "block": 27956315,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-23T16:25:39",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "woocommercepluginpatchescriticalvulnerability-85f59yxcus",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/11/23 16:25:39
parent author
parent permlinktechnology
authoravalerion
permlinkwoocommercepluginpatchescriticalvulnerability-85f59yxcus
titleWooCommerce Plugin Patches Critical Vulnerability
body<center>https://hackhex.com/wp-content/uploads/2018/11/1542926850_Popular-WooCommerce-WordPress-Plugin-Patches-Critical-Vulnerability.jpg</center> <br/> <p>If you own an eCommerce website built on <strong>WordPress</strong> and powered by WooCommerce plugin, then beware of a new vulnerability that could compromise your online store.</p> <p>Simon Scannell, a researcher at RIPS Technologies GmbH, <a href="https://blog.ripstech.com/2018/wordpress-design-flaw-leads-to-woocommerce-rce/" target="_blank" rel="noreferrer noopener">discovered</a> an arbitrary file deletion vulnerability in the popular <strong>WooCommerce plugin</strong> that could allow a malicious or compromised privileged user to gain full control over the unpatched websites.</p> <p><a href="https://wordpress.org/plugins/woocommerce/" target="_blank" rel="noreferrer noopener">WooCommerce</a> is one the most popular eCommerce plugins for WordPress that helps websites to upgrade their standard blog to a powerful online store. WooCommerce powers nearly 35% of e-stores on the internet, with more than 4 million installations.</p> <h3>Exploiting WooCommerce File-Deletion and WordPress Design Flaws</h3> <p>The attack demonstrated in the following video takes advantage of the way WordPress handles user privileges and WooCommerce file deletion vulnerability, allowing an account with "Shop Manager" role to eventually reset administrator accounts' password and take complete control over the website.</p> <p>When installed, WooCommerce extension creates "Shop Managers" accounts with "edit_users" capability, allowing them to edit customer accounts of the store in order to manage their orders, profiles, and products.</p> <p>In WordPress, an account with "edit_users" capability by default allowed to even edit an administrator account and reset its password. But to draw a permission-based line between an administrator and a shop manager account, the WooCommerce plugin adds some extra limitations on the shop managers.</p> <p>However, the researcher discovered that if <a href="https://wordpress.org/download/" target="_blank" rel="noreferrer noopener">WordPress</a> admin, for some reason, disables the WooCommerce plugin, its configuration that mandated the limitation goes away, allowing Shop Manager accounts to edit and reset the password for administrator accounts.</p> <p>Now, according to Simon, a malicious Shop Manager can forcefully disable the WooCommerce plugin by exploiting a file deletion vulnerability that resides in the logging feature of WooCommerce.</p> <blockquote class="wp-block-quote"><p>"This vulnerability allows shop managers to delete any file on the server that is writable. By deleting the main file of WooCommerce, woocommerce.php, WordPress will be unable to load the plugin and then disables it," Simon explains in a <a href="https://blog.ripstech.com/2018/wordpress-design-flaw-leads-to-woocommerce-rce/" target="_blank" rel="noreferrer noopener">blog post</a>. </p> </blockquote> <p>Once the file is deleted, the WooCommerce plugin gets disabled, allowing shop managers to update the password for the administrator account and then take over the complete website.</p> <h3>Install WooCommerce and WordPress Patch Updates</h3> <p>The researcher responsibly reported the security issues to the Automattic security team, who manages the WooCommerce plugin, via Hackerone on 30, August 2018. The team acknowledged the flaws and fixed them in Woocommerce version 3.4.6 last month.</p> <p>If you haven't yet updated your WordPress and Woocommerce, you are highly recommended to install the latest available security updates as soon as possible.</p> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/woocommerce-plugin-patches-critical-vulnerability-631.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/11/1542926850_Popular-WooCommerce-WordPress-Plugin-Patches-Critical-Vulnerability.jpg"],"tags":["technology","news","ecommercesoftware","hackwordpress","hackingwordpress"],"original_link":"https://hackhex.com/computer/woocommerce-plugin-patches-critical-vulnerability-631.html"}
Transaction InfoBlock #27956315/Trx c3ffd71d1b90d7249286e4feead54a2641149394
View Raw JSON Data
{
  "trx_id": "c3ffd71d1b90d7249286e4feead54a2641149394",
  "block": 27956315,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-23T16:25:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "technology",
      "author": "avalerion",
      "permlink": "woocommercepluginpatchescriticalvulnerability-85f59yxcus",
      "title": "WooCommerce Plugin Patches Critical Vulnerability",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/11/1542926850_Popular-WooCommerce-WordPress-Plugin-Patches-Critical-Vulnerability.jpg</center> <br/>\n<p>If you own an eCommerce website built on <strong>WordPress</strong> and powered by WooCommerce plugin, then beware of a new vulnerability that could compromise your online store.</p>\n\n\n\n<p>Simon Scannell, a researcher at RIPS Technologies GmbH, <a href=\"https://blog.ripstech.com/2018/wordpress-design-flaw-leads-to-woocommerce-rce/\" target=\"_blank\" rel=\"noreferrer noopener\">discovered</a> an arbitrary file deletion vulnerability in the popular <strong>WooCommerce plugin</strong> that could allow a malicious or compromised privileged user to gain full control over the unpatched websites.</p>\n\n\n\n<p><a href=\"https://wordpress.org/plugins/woocommerce/\" target=\"_blank\" rel=\"noreferrer noopener\">WooCommerce</a> is one the most popular eCommerce plugins for WordPress that helps websites to upgrade their standard blog to a powerful online store. WooCommerce powers nearly 35% of e-stores on the internet, with more than 4 million installations.</p>\n\n\n\n<h3>Exploiting WooCommerce File-Deletion and WordPress Design Flaws</h3>\n\n\n\n<p>The attack demonstrated in the following video takes advantage of the way WordPress handles user privileges and WooCommerce file deletion vulnerability, allowing an account with \"Shop Manager\" role to eventually reset administrator accounts' password and take complete control over the website.</p>\n\n\n\n<p>When installed, WooCommerce extension creates \"Shop Managers\" accounts with \"edit_users\" capability, allowing them to edit customer accounts of the store in order to manage their orders, profiles, and products.</p>\n\n\n\n<p>In WordPress, an account with \"edit_users\" capability by default allowed to even edit an administrator account and reset its password. But to draw a permission-based line between an administrator and a shop manager account, the WooCommerce plugin adds some extra limitations on the shop managers.</p>\n\n\n\n<p>However, the researcher discovered that if <a href=\"https://wordpress.org/download/\" target=\"_blank\" rel=\"noreferrer noopener\">WordPress</a> admin, for some reason, disables the WooCommerce plugin, its configuration that mandated the limitation goes away, allowing Shop Manager accounts to edit and reset the password for administrator accounts.</p>\n\n\n\n<p>Now, according to Simon, a malicious Shop Manager can forcefully disable the WooCommerce plugin by exploiting a file deletion vulnerability that resides in the logging feature of WooCommerce.</p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>\"This vulnerability allows shop managers to delete any file on the server that is writable. By deleting the main file of WooCommerce, woocommerce.php, WordPress will be unable to load the plugin and then disables it,\" Simon explains in a <a href=\"https://blog.ripstech.com/2018/wordpress-design-flaw-leads-to-woocommerce-rce/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post</a>.\n</p>\n</blockquote>\n\n\n\n<p>Once the file is deleted, the WooCommerce plugin gets disabled, allowing shop managers to update the password for the administrator account and then take over the complete website.</p>\n\n\n\n<h3>Install WooCommerce and WordPress Patch Updates</h3>\n\n\n\n<p>The researcher responsibly reported the security issues to the Automattic security team, who manages the WooCommerce plugin, via Hackerone on 30, August 2018. The team acknowledged the flaws and fixed them in Woocommerce version 3.4.6 last month.</p>\n\n\n\n<p>If you haven't yet updated your WordPress and Woocommerce, you are highly recommended to install the latest available security updates as soon as possible.</p>\n <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/woocommerce-plugin-patches-critical-vulnerability-631.html </em><hr/></center>    ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/11/1542926850_Popular-WooCommerce-WordPress-Plugin-Patches-Critical-Vulnerability.jpg\"],\"tags\":[\"technology\",\"news\",\"ecommercesoftware\",\"hackwordpress\",\"hackingwordpress\"],\"original_link\":\"https://hackhex.com/computer/woocommerce-plugin-patches-critical-vulnerability-631.html\"}"
    }
  ]
}
avalerioncancelled power down
2018/11/22 14:22:48
accountavalerion
vesting shares0.000000 VESTS
Transaction InfoBlock #27925075/Trx 641b3f24f6f8d26074ddfb69eda03a5a4337f877
View Raw JSON Data
{
  "trx_id": "641b3f24f6f8d26074ddfb69eda03a5a4337f877",
  "block": 27925075,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T14:22:48",
  "op": [
    "withdraw_vesting",
    {
      "account": "avalerion",
      "vesting_shares": "0.000000 VESTS"
    }
  ]
}
avalerionstarted power down of 1.249 SP
2018/11/22 14:19:30
accountavalerion
vesting shares2033.355999 VESTS
Transaction InfoBlock #27925009/Trx 016195921bf02953146eff0517389bc29264acd2
View Raw JSON Data
{
  "trx_id": "016195921bf02953146eff0517389bc29264acd2",
  "block": 27925009,
  "trx_in_block": 23,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T14:19:30",
  "op": [
    "withdraw_vesting",
    {
      "account": "avalerion",
      "vesting_shares": "2033.355999 VESTS"
    }
  ]
}
2018/11/22 14:13:00
voteravalerion
authorschattenjaeger
permlinkstop-making-steemit-all-about-the-money-it-won-t-work-and-other-ranting-about-what-sucks-about-steemit
weight10000 (100.00%)
Transaction InfoBlock #27924879/Trx 305be4dac9186e08916e4f3b8f7bff138f481344
View Raw JSON Data
{
  "trx_id": "305be4dac9186e08916e4f3b8f7bff138f481344",
  "block": 27924879,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T14:13:00",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "schattenjaeger",
      "permlink": "stop-making-steemit-all-about-the-money-it-won-t-work-and-other-ranting-about-what-sucks-about-steemit",
      "weight": 10000
    }
  ]
}
2018/11/22 09:12:18
voteravalerion
authoravalerion
permlinkopeningasiteinsafaricouldhavehackedyourmacos-p6ukb6rz1t
weight10000 (100.00%)
Transaction InfoBlock #27918867/Trx 9a4fa054f97453bbf77112895d9708ae8008818a
View Raw JSON Data
{
  "trx_id": "9a4fa054f97453bbf77112895d9708ae8008818a",
  "block": 27918867,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:12:18",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "openingasiteinsafaricouldhavehackedyourmacos-p6ukb6rz1t",
      "weight": 10000
    }
  ]
}
2018/11/22 09:12:18
authoravalerion
permlinkopeningasiteinsafaricouldhavehackedyourmacos-p6ukb6rz1t
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #27918867/Trx 9a4fa054f97453bbf77112895d9708ae8008818a
View Raw JSON Data
{
  "trx_id": "9a4fa054f97453bbf77112895d9708ae8008818a",
  "block": 27918867,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:12:18",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "openingasiteinsafaricouldhavehackedyourmacos-p6ukb6rz1t",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/11/22 09:12:18
parent author
parent permlinkapplemacos
authoravalerion
permlinkopeningasiteinsafaricouldhavehackedyourmacos-p6ukb6rz1t
titleOpening A Site In Safari Could Have Hacked Your macOS
body<center>https://hackhex.com/wp-content/uploads/2018/11/1542877303_How-Just-Opening-A-Site-In-Safari-Could-Have-Hacked-Your-Apple-macOS.png</center> <br/> <p>Earlier this week Dropbox team unveiled details of three critical vulnerabilities in <strong>Apple macOS</strong> operating system, which altogether could allow a remote attacker to execute malicious code on a targeted Mac computer just by convincing a victim into visiting a malicious web page.</p> <p>The reported vulnerabilities were originally discovered by <strong>Syndis</strong>, a cybersecurity firm hired by Dropbox to conduct simulated penetration testing attacks as Red Team on the company's IT infrastructure, including Apple software used by <strong>Dropbox</strong>.</p> <p>The vulnerabilities were discovered and disclosed to Apple security team in February this year, which were then patched by Apple just over one month later with the release of its&nbsp;<a href="https://support.apple.com/en-us/HT208692" target="_blank" rel="noreferrer noopener">March security updates</a>. DropBox applauded Apple for its quick response to its bug report.</p> <p>According to DropBox, the vulnerabilities discovered by Syndis didn't just affect its macOS fleet, but also affected all Safari users running the latest version of the web browser and operating system at the time.</p> <figure class="wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper"> https://www.youtube.com/watch?v=RYmZoqt1PfQ </div><figcaption>Demonstration Video</figcaption></figure> <p>Here's the list of the three reported (then-zero-day) vulnerabilities:</p> <ol><li>The first flaw (<strong>CVE-2017-13890</strong>) that resided in CoreTypes component of macOS allowed Safari web browser to automatically download and mount a disk image on visitors’ system through a maliciously crafted web page.</li><li>The second flaw (<strong>CVE-2018-4176</strong>) resided in the way Disk Images handled .bundle files, which are applications packaged as directories. Exploiting the flaw could have allowed an attacker to launch a malicious application from mounted disk using a bootable volume utility called bless and its --openfolder argument.</li><li>The third vulnerability (<strong>CVE-2018-4175</strong>) involved a bypass of macOS Gatekeeper anti-malware, allowing a maliciously crafted application to bypass code signing enforcement and execute a modified version of Terminal app leading to arbitrary commands execution.</li></ol> <p>As shown in the proof-of-concept video demonstration, the researchers were able to create a two-stage attack by chaining together all the three vulnerabilities to take control of a Mac computer just by convincing a victim into visiting a malicious web page with Safari.</p> <blockquote class="wp-block-quote"><p>"The first stage includes a modified version of the Terminal app, which is registered as a handler for a new file extension (.workingpoc). In addition, it would contain a blank folder called "test.bundle" which would be set as the default "openfolder" which automatically would open /Applications/Terminal.app without prompt," DropBox says in its <a href="https://blogs.dropbox.com/tech/2018/11/offensive-testing-to-make-dropbox-and-the-world-a-safer-place/" target="_blank" rel="noreferrer noopener">blog post</a>.</p><p>"The second stage includes an unsigned shellscript with the extension ".workingpoc" which is then executed within the running Terminal application without prompt."</p> </blockquote> <p>Apple released security updates on March 29 that included the security fixes for the three vulnerabilities. So, you just need to make sure that&nbsp;you install all monthly security updates regularly in order to protect your systems against any threat.</p> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/opening-a-site-in-safari-could-have-hacked-your-macos-525.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/11/1542877303_How-Just-Opening-A-Site-In-Safari-Could-Have-Hacked-Your-Apple-macOS.png"],"tags":["applemacos","applesafari","dropbox","hackingmaccomputer","macbookhack"],"original_link":"https://hackhex.com/computer/opening-a-site-in-safari-could-have-hacked-your-macos-525.html"}
Transaction InfoBlock #27918867/Trx 9a4fa054f97453bbf77112895d9708ae8008818a
View Raw JSON Data
{
  "trx_id": "9a4fa054f97453bbf77112895d9708ae8008818a",
  "block": 27918867,
  "trx_in_block": 15,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:12:18",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "applemacos",
      "author": "avalerion",
      "permlink": "openingasiteinsafaricouldhavehackedyourmacos-p6ukb6rz1t",
      "title": "Opening A Site In Safari Could Have Hacked Your macOS",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/11/1542877303_How-Just-Opening-A-Site-In-Safari-Could-Have-Hacked-Your-Apple-macOS.png</center> <br/>\n<p>Earlier this week Dropbox team unveiled details of three critical vulnerabilities in <strong>Apple macOS</strong> operating system, which altogether could allow a remote attacker to execute malicious code on a targeted Mac computer just by convincing a victim into visiting a malicious web page.</p>\n\n\n\n<p>The reported vulnerabilities were originally discovered by <strong>Syndis</strong>, a cybersecurity firm hired by Dropbox to conduct simulated penetration testing attacks as Red Team on the company's IT infrastructure, including Apple software used by <strong>Dropbox</strong>.</p>\n\n\n\n<p>The vulnerabilities were discovered and disclosed to Apple security team in February this year, which were then patched by Apple just over one month later with the release of its&nbsp;<a href=\"https://support.apple.com/en-us/HT208692\" target=\"_blank\" rel=\"noreferrer noopener\">March security updates</a>. DropBox applauded Apple for its quick response to its bug report.</p>\n\n\n\n<p>According to DropBox, the vulnerabilities discovered by Syndis didn't just affect its macOS fleet, but also affected all Safari users running the latest version of the web browser and operating system at the time.</p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps://www.youtube.com/watch?v=RYmZoqt1PfQ\n</div><figcaption>Demonstration Video</figcaption></figure>\n\n\n\n<p>Here's the list of the three reported (then-zero-day) vulnerabilities:</p>\n\n\n\n<ol><li>The first flaw (<strong>CVE-2017-13890</strong>) that resided in CoreTypes component of macOS allowed Safari web browser to automatically download and mount a disk image on visitors’ system through a maliciously crafted web page.</li><li>The second flaw (<strong>CVE-2018-4176</strong>) resided in the way Disk Images handled .bundle files, which are applications packaged as directories. Exploiting the flaw could have allowed an attacker to launch a malicious application from mounted disk using a bootable volume utility called bless and its --openfolder argument.</li><li>The third vulnerability (<strong>CVE-2018-4175</strong>) involved a bypass of macOS Gatekeeper anti-malware, allowing a maliciously crafted application to bypass code signing enforcement and execute a modified version of Terminal app leading to arbitrary commands execution.</li></ol>\n\n\n\n<p>As shown in the proof-of-concept video demonstration, the researchers were able to create a two-stage attack by chaining together all the three vulnerabilities to take control of a Mac computer just by convincing a victim into visiting a malicious web page with Safari.</p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>\"The first stage includes a modified version of the Terminal app, which is registered as a handler for a new file extension (.workingpoc). In addition, it would contain a blank folder called \"test.bundle\" which would be set as the default \"openfolder\" which automatically would open /Applications/Terminal.app without prompt,\" DropBox says in its <a href=\"https://blogs.dropbox.com/tech/2018/11/offensive-testing-to-make-dropbox-and-the-world-a-safer-place/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post</a>.</p><p>\"The second stage includes an unsigned shellscript with the extension \".workingpoc\" which is then executed within the running Terminal application without prompt.\"</p>\n</blockquote>\n\n\n\n<p>Apple released security updates on March 29 that included the security fixes for the three vulnerabilities. So, you just need to make sure that&nbsp;you install all monthly security updates regularly in order to protect your systems against any threat.</p>\n <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/opening-a-site-in-safari-could-have-hacked-your-macos-525.html </em><hr/></center>   ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/11/1542877303_How-Just-Opening-A-Site-In-Safari-Could-Have-Hacked-Your-Apple-macOS.png\"],\"tags\":[\"applemacos\",\"applesafari\",\"dropbox\",\"hackingmaccomputer\",\"macbookhack\"],\"original_link\":\"https://hackhex.com/computer/opening-a-site-in-safari-could-have-hacked-your-macos-525.html\"}"
    }
  ]
}
avalerionupdated their account properties
2018/11/22 09:09:00
accountavalerion
memo keySTM7cpV1wTaMMW7HE4QQ7ArLJwPcTbpLaexYeJSF9Br9WqZCtDQvV
json metadata{"profile":{"name":"Hack Hex","website":"https://hackhex.com","profile_image":"https://cdn.steemitimages.com/DQmULhS1DwthRw598V432LZSHQe7fz9oJ2eGHFv5X8XaEoM/New%20Project%20(2).png"}}
Transaction InfoBlock #27918801/Trx b4333756bde59e972a4ec8e925fe58820385056d
View Raw JSON Data
{
  "trx_id": "b4333756bde59e972a4ec8e925fe58820385056d",
  "block": 27918801,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:09:00",
  "op": [
    "account_update",
    {
      "account": "avalerion",
      "memo_key": "STM7cpV1wTaMMW7HE4QQ7ArLJwPcTbpLaexYeJSF9Br9WqZCtDQvV",
      "json_metadata": "{\"profile\":{\"name\":\"Hack Hex\",\"website\":\"https://hackhex.com\",\"profile_image\":\"https://cdn.steemitimages.com/DQmULhS1DwthRw598V432LZSHQe7fz9oJ2eGHFv5X8XaEoM/New%20Project%20(2).png\"}}"
    }
  ]
}
avalerionupdated their account properties
2018/11/22 09:08:06
accountavalerion
memo keySTM7cpV1wTaMMW7HE4QQ7ArLJwPcTbpLaexYeJSF9Br9WqZCtDQvV
json metadata{"profile":{"name":"Hack Hex","website":"https://hackhex.com"}}
Transaction InfoBlock #27918783/Trx 275c9f0b44d7de53233a9288d09e6b71efe6397b
View Raw JSON Data
{
  "trx_id": "275c9f0b44d7de53233a9288d09e6b71efe6397b",
  "block": 27918783,
  "trx_in_block": 20,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:08:06",
  "op": [
    "account_update",
    {
      "account": "avalerion",
      "memo_key": "STM7cpV1wTaMMW7HE4QQ7ArLJwPcTbpLaexYeJSF9Br9WqZCtDQvV",
      "json_metadata": "{\"profile\":{\"name\":\"Hack Hex\",\"website\":\"https://hackhex.com\"}}"
    }
  ]
}
2018/11/22 09:06:36
parent authoravalerion
parent permlinktalktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6
authorcheetah
permlinkcheetah-re-avaleriontalktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6
title
bodyHi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://hacknews.co/data-breaches/20181120/two-talktalk-hackers-jailed-for-2015-data-breach-that-cost-it-77-million.html
json metadata
Transaction InfoBlock #27918753/Trx c64ffd72627a65e8baffae239fc1cbb04e6b21a8
View Raw JSON Data
{
  "trx_id": "c64ffd72627a65e8baffae239fc1cbb04e6b21a8",
  "block": 27918753,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:06:36",
  "op": [
    "comment",
    {
      "parent_author": "avalerion",
      "parent_permlink": "talktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6",
      "author": "cheetah",
      "permlink": "cheetah-re-avaleriontalktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6",
      "title": "",
      "body": "Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:\nhttps://hacknews.co/data-breaches/20181120/two-talktalk-hackers-jailed-for-2015-data-breach-that-cost-it-77-million.html",
      "json_metadata": ""
    }
  ]
}
2018/11/22 09:06:30
votercheetah
authoravalerion
permlinktalktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6
weight8 (0.08%)
Transaction InfoBlock #27918751/Trx 087ea9043695d06e3f152eb907834b123596259e
View Raw JSON Data
{
  "trx_id": "087ea9043695d06e3f152eb907834b123596259e",
  "block": 27918751,
  "trx_in_block": 25,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:06:30",
  "op": [
    "vote",
    {
      "voter": "cheetah",
      "author": "avalerion",
      "permlink": "talktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6",
      "weight": 8
    }
  ]
}
2018/11/22 09:06:21
voteravalerion
authoravalerion
permlinktalktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6
weight10000 (100.00%)
Transaction InfoBlock #27918748/Trx d28a6d82109349f7dafa610791a7f21ec974919d
View Raw JSON Data
{
  "trx_id": "d28a6d82109349f7dafa610791a7f21ec974919d",
  "block": 27918748,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:06:21",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "avalerion",
      "permlink": "talktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6",
      "weight": 10000
    }
  ]
}
2018/11/22 09:06:21
authoravalerion
permlinktalktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6
max accepted payout1000000.000 SBD
percent steem dollars10000
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"steempress","weight":1500}]}]]
Transaction InfoBlock #27918748/Trx d28a6d82109349f7dafa610791a7f21ec974919d
View Raw JSON Data
{
  "trx_id": "d28a6d82109349f7dafa610791a7f21ec974919d",
  "block": 27918748,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:06:21",
  "op": [
    "comment_options",
    {
      "author": "avalerion",
      "permlink": "talktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 10000,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "steempress",
                "weight": 1500
              }
            ]
          }
        ]
      ]
    }
  ]
}
2018/11/22 09:06:21
parent author
parent permlinkcreditcardhacked
authoravalerion
permlinktalktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6
titleTalkTalk hackers jailed for 2015 data breach that cost $98 million dollars
body<center>https://hackhex.com/wp-content/uploads/2018/11/1542877353_Two-TalkTalk-hackers-jailed-for-2015-data-breach-that-cost-it-£77-million.png</center> <br/><div id="articlebody"> <div dir="ltr" style="text-align: left;"> Two hackers have been sent to prison for their roles in hacking TalkTalk, one of the biggest UK-based telecommunications company, in 2015 and stealing personal information, banking, and credit card details belonging to more than 156,000 customers. Matthew Hanley, 23, and Connor Allsopp, 21, both from Tamworth in Staffordshire, were sentenced Monday to 12 months and 8 months in prison, respectively, after they admitted charges relating to the massive breach that cost TalkTalk £77 million in losses. The total cost also included the massive £400,000 fine imposed by the Information Commissioner's Office (ICO) on TalkTalk for failings to implement the most basic security measures in order to prevent the hack from happening. At the Old Bailey, the judge Anuja Dhir described Hanley as a "dedicated hacker" and sentenced him to 12 months in prison; whereas, Allsopp gets 8-months prison for his lesser role in the cyber attack. The Judge also said that it was a tragedy to find "two individuals of such extraordinary talent," Daily Mail <a href="https://www.dailymail.co.uk/news/article-6406461/Hacker-23-broke-TalkTalks-website-77million-data-breach-jailed.html" target="_blank" rel="noopener">reported</a>. <blockquote class="tr_bq">"Given the scale of the attack, the number of people whose confidential information was stolen and then passed on to others, I'm sure that your actions caused misery and distress to many thousands of the customers of TalkTalk," Dhir added. </blockquote> Hanley broke into the company's website between October 16 and 21 in 2015 and stole personal and banking details of 156,959 customers. He then passed the stolen information on to his friend Allsopp, who later sold the data to another online user for fraud. The stolen information included customers' full names, postal addresses, dates of birth, telephone numbers, email addresses, and TalkTalk accounts information, and in almost 16,000 cases, the attackers also accessed financial information. Another hacker, Daniel Kelley, 21, was arrested, charged and pledged guilty in 2016, for obtaining the stolen data of TalkTalk customers and blackmailing the company's then-CEO, Dido Harding, in an attempt to extort 465 Bitcoins. <blockquote class="tr_bq">"Your actions, the actions of others, resulted in the then-CEO of TalkTalk being subjected to repeated attempts to blackmail her for money. You were not personally involved in making those attempts, but your actions helped facilitate it," Judge Dhir told Hanley and Allsopp. </blockquote> In the weeks following the TalkTalk breach, several teenagers, including a 15-year-old boy from Northern Ireland, a 16-year-old boy from west London, and another 16-year-old from London, were arrested for their alleged role in hacking and blackmailing the telecom company. </div> </div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/talktalk-hackers-jailed-for-2015-data-breach-that-cost-98-million-dollars-534.html </em><hr/></center>
json metadata{"community":"steempress","app":"steempress/1.4","image":["https://hackhex.com/wp-content/uploads/2018/11/1542877353_Two-TalkTalk-hackers-jailed-for-2015-data-breach-that-cost-it-£77-million.png"],"tags":["creditcardhacked","creditcardhacking","cyberattack","cybercrime","databreach"],"original_link":"https://hackhex.com/computer/talktalk-hackers-jailed-for-2015-data-breach-that-cost-98-million-dollars-534.html"}
Transaction InfoBlock #27918748/Trx d28a6d82109349f7dafa610791a7f21ec974919d
View Raw JSON Data
{
  "trx_id": "d28a6d82109349f7dafa610791a7f21ec974919d",
  "block": 27918748,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T09:06:21",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "creditcardhacked",
      "author": "avalerion",
      "permlink": "talktalkhackersjailedfor2015databreachthatcost98milliondollars-rgclbhj8h6",
      "title": "TalkTalk hackers jailed for 2015 data breach that cost $98 million dollars",
      "body": "<center>https://hackhex.com/wp-content/uploads/2018/11/1542877353_Two-TalkTalk-hackers-jailed-for-2015-data-breach-that-cost-it-£77-million.png</center> <br/><div id=\"articlebody\">\n<div dir=\"ltr\" style=\"text-align: left;\">\n\nTwo hackers have been sent to prison for their roles in hacking TalkTalk, one of the biggest UK-based telecommunications company, in 2015 and stealing personal information, banking, and credit card details belonging to more than 156,000 customers.\n\nMatthew Hanley, 23, and Connor Allsopp, 21, both from Tamworth in Staffordshire, were sentenced Monday to 12 months and 8 months in prison, respectively, after they admitted charges relating to the massive breach that cost TalkTalk £77 million in losses.\n\nThe total cost also included the massive £400,000 fine imposed by the Information Commissioner's Office (ICO) on TalkTalk for failings to implement the most basic security measures in order to prevent the hack from happening.\n\nAt the Old Bailey, the judge Anuja Dhir described Hanley as a \"dedicated hacker\" and sentenced him to 12 months in prison; whereas, Allsopp gets 8-months prison for his lesser role in the cyber attack.\n\nThe Judge also said that it was a tragedy to find \"two individuals of such extraordinary talent,\" Daily Mail <a href=\"https://www.dailymail.co.uk/news/article-6406461/Hacker-23-broke-TalkTalks-website-77million-data-breach-jailed.html\" target=\"_blank\" rel=\"noopener\">reported</a>.\n<blockquote class=\"tr_bq\">\"Given the scale of the attack, the number of people whose confidential information was stolen and then passed on to others, I'm sure that your actions caused misery and distress to many thousands of the customers of TalkTalk,\" Dhir added.\n</blockquote>\nHanley broke into the company's website between October 16 and 21 in 2015 and stole personal and banking details of 156,959 customers. He then passed the stolen information on to his friend Allsopp, who later sold the data to another online user for fraud.\n\nThe stolen information included customers' full names, postal addresses, dates of birth, telephone numbers, email addresses, and TalkTalk accounts information, and in almost 16,000 cases, the attackers also accessed financial information.\n\nAnother hacker, Daniel Kelley, 21, was arrested, charged and pledged guilty in 2016, for obtaining the stolen data of TalkTalk customers and blackmailing the company's then-CEO, Dido Harding, in an attempt to extort 465 Bitcoins.\n<blockquote class=\"tr_bq\">\"Your actions, the actions of others, resulted in the then-CEO of TalkTalk being subjected to repeated attempts to blackmail her for money. You were not personally involved in making those attempts, but your actions helped facilitate it,\" Judge Dhir told Hanley and Allsopp.\n</blockquote>\nIn the weeks following the TalkTalk breach, several teenagers, including a 15-year-old boy from Northern Ireland, a 16-year-old boy from west London, and another 16-year-old from London, were arrested for their alleged role in hacking and blackmailing the telecom company.\n\n</div>\n</div> <br /><center><hr/><em>Link to Original Article: https://hackhex.com/computer/talktalk-hackers-jailed-for-2015-data-breach-that-cost-98-million-dollars-534.html </em><hr/></center>   ",
      "json_metadata": "{\"community\":\"steempress\",\"app\":\"steempress/1.4\",\"image\":[\"https://hackhex.com/wp-content/uploads/2018/11/1542877353_Two-TalkTalk-hackers-jailed-for-2015-data-breach-that-cost-it-£77-million.png\"],\"tags\":[\"creditcardhacked\",\"creditcardhacking\",\"cyberattack\",\"cybercrime\",\"databreach\"],\"original_link\":\"https://hackhex.com/computer/talktalk-hackers-jailed-for-2015-data-breach-that-cost-98-million-dollars-534.html\"}"
    }
  ]
}
2018/11/22 08:53:24
voteravalerion
authorkiorsergey
permlinkre-majestytyty-time-stands-still-space-stands-still-koh-wai-thailand-landscape-photography-20181121t094231197z
weight10000 (100.00%)
Transaction InfoBlock #27918489/Trx dd97991d72eaccda89fbc2a02b498b8d8bed7545
View Raw JSON Data
{
  "trx_id": "dd97991d72eaccda89fbc2a02b498b8d8bed7545",
  "block": 27918489,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2018-11-22T08:53:24",
  "op": [
    "vote",
    {
      "voter": "avalerion",
      "author": "kiorsergey",
      "permlink": "re-majestytyty-time-stands-still-space-stands-still-koh-wai-thailand-landscape-photography-20181121t094231197z",
      "weight": 10000
    }
  ]
}

Account Metadata

POSTING JSON METADATA
profile{"name":"Hack Hex","website":"https://hackhex.com","profile_image":"https://cdn.steemitimages.com/DQmULhS1DwthRw598V432LZSHQe7fz9oJ2eGHFv5X8XaEoM/New%20Project%20(2).png"}
JSON METADATA
profile{"name":"Hack Hex","website":"https://hackhex.com","profile_image":"https://cdn.steemitimages.com/DQmULhS1DwthRw598V432LZSHQe7fz9oJ2eGHFv5X8XaEoM/New%20Project%20(2).png"}
{
  "posting_json_metadata": {
    "profile": {
      "name": "Hack Hex",
      "website": "https://hackhex.com",
      "profile_image": "https://cdn.steemitimages.com/DQmULhS1DwthRw598V432LZSHQe7fz9oJ2eGHFv5X8XaEoM/New%20Project%20(2).png"
    }
  },
  "json_metadata": {
    "profile": {
      "name": "Hack Hex",
      "website": "https://hackhex.com",
      "profile_image": "https://cdn.steemitimages.com/DQmULhS1DwthRw598V432LZSHQe7fz9oJ2eGHFv5X8XaEoM/New%20Project%20(2).png"
    }
  }
}

Auth Keys

Owner
Single Signature
Public Keys
STM4y89VCqtVE8z3PP69JivgtzgsfNuZzsgNL1XVBD8bW1mQksS7d1/1
Active
Single Signature
Public Keys
STM7mTeph5itmfBA8MXkvouG8qoEuYQR3tv4LA7ahQQuAzrHs8R751/1
Posting
Single Signature
Public Keys
STM7XmLDgNiQs78isSJfsx8LFedmSQsvzRxns5TBVTsv7VofRqsC71/1
Memo
STM7cpV1wTaMMW7HE4QQ7ArLJwPcTbpLaexYeJSF9Br9WqZCtDQvV
{
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM4y89VCqtVE8z3PP69JivgtzgsfNuZzsgNL1XVBD8bW1mQksS7d",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7mTeph5itmfBA8MXkvouG8qoEuYQR3tv4LA7ahQQuAzrHs8R75",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7XmLDgNiQs78isSJfsx8LFedmSQsvzRxns5TBVTsv7VofRqsC7",
        1
      ]
    ]
  },
  "memo": "STM7cpV1wTaMMW7HE4QQ7ArLJwPcTbpLaexYeJSF9Br9WqZCtDQvV"
}

Witness Votes

0 / 30
No active witness votes.
[]