- AntiSec hackers leak 1,000,001 Apple device IDs allegedly obtained from FBI breach
- “During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of ”NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts. no other file on the same folder makes mention about
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| .row { | |
| width: 100%; | |
| max-width: $document-max-width; | |
| margin-left: auto; | |
| margin-right: auto; | |
| margin-top: 0; | |
| margin-bottom: $general-padding; | |
| &:before, &:after { | |
| content: " "; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| private String getPersonsAsJSON(List<Person> personList) throws JSONException { | |
| JSONObject json = new JSONObject(); | |
| JSONArray jsonPeopleList = new JSONArray(); | |
| if (personList != null) { | |
| for (Person p : personList) { | |
| JSONObject personJson = new JSONObject(); | |
| personJson.put("firstname", p.getFirstName()); | |
| personJson.put("lastname", p.getLastName()); | |
| personJson.put("email", p.getEmail()); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| var foo = {}; | |
| navigator.geolocation.getCurrentPosition(function(position) { | |
| performFancyStuff(position, foo); | |
| }, function(error) { | |
| alert('Error occurred. Error code: ' + error.code); | |
| }); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| .hide-text { | |
| text-indent: 100%; | |
| white-space: nowrap; | |
| overflow: hidden; | |
| } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // geo-location shim | |
| // currentely only serves lat/long | |
| // depends on jQuery | |
| ;(function(geolocation){ | |
| if (geolocation) return; | |
| var cache; |
NewerOlder