Computing

legion__group

5 things that tell you “Legion” hackers are yet another BJP front

So a few days ago,anonymous hackers calling themselves “Legion” hacked Rahul Gandhi’s Twitter account and made profane tweets from it. Anonymous legion hackers then compromised the official Congress handle and other accounts, all of them with official inc.in email IDs. Yesterday, the anonymous hackers calling themselves “Legion” hacked Barkha Dutt’s Twitter account followed by Ravish Kumar’s. The …

5 things that tell you “Legion” hackers are yet another BJP front Read More »

Illustration of how a file or document is sent using Public key encryption by Johannes Landin

DEITY National Encryption Policy is as good as forbidding encryption

First of all, what is National Encryption Policy? “Under Section 84A of Information Technology Act, 2000 Rules are to be framed to prescribe modes or methods for encryption”. So DeitY has framed a draft of such rules which will decide the future of how encrypted services are to be used or provided to users in …

DEITY National Encryption Policy is as good as forbidding encryption Read More »

The Diaspora Yatra

Zuck: Yeah so if you ever need info about anyone at Harvard Just ask. I have over 4,000 emails, pictures, addresses, SNS† Friend: What? How’d you manage that one? Zuck: People just submitted it. I don’t know why. They “trust me” Dumb *ucks. The Zuck in the above conversation is Mark Zuckerberg. And they are …

The Diaspora Yatra Read More »

U.S. Central Command @CENTCOM Twitter hacked

ISIS hacks CENTCOM Twitter and Youtube accounts

The Twitter and Youtube accounts of CENTCOM (Central Command) appear to be hacked and are posting pro ISIS content, threats as well as what appears to be detailed information for officers. The account claims to have breached computers in all military bases. The account is currently suspended.. Others on Twitter have expressed skepticism about the hacked …

ISIS hacks CENTCOM Twitter and Youtube accounts Read More »