{"id":17946,"date":"2021-06-13T15:01:27","date_gmt":"2021-06-13T13:01:27","guid":{"rendered":"https:\/\/tuxproject.de\/blog\/?p=17946"},"modified":"2021-06-13T15:01:27","modified_gmt":"2021-06-13T13:01:27","slug":"optinfoil-das-gegenteil-von-hacken","status":"publish","type":"post","link":"https:\/\/tuxproject.de\/blog\/2021\/06\/optinfoil-das-gegenteil-von-hacken\/","title":{"rendered":"#OpTinfoil: Das Gegenteil von Hacken"},"content":{"rendered":"<p>Was \u201ct\u2011online\u201d <a href=\"https:\/\/www.t-online.de\/digital\/internet\/id_90210832\/hackerangriff-auf-ken-jebsen-anonymous-attackiert-kenfm-.html\">behauptet<\/a>, was Hack\u00ader sind:<\/p>\n<blockquote>\n<p>Die Hack\u00ader suchen nach Schwach\u00adstellen in der Struk\u00adtur von Inter\u00adne\u00adtauftrit\u00adten, um Rechte und Zugriffe zu bekom\u00admen. (\u2026) Anony\u00admous bere\u00adit\u00adet die Ent\u00addeck\u00adun\u00adgen dabei in eige\u00adnen Tex\u00adten auf.<\/p>\n<\/blockquote>\n<p>Was Hack\u00ader allerd\u00adings <a href=\"https:\/\/www.innotruck.de\/mobile-ausstellung\/exponatkatalog\/cybersicherheit\/cybersicherheit-hacker\">auch sind:<\/a><\/p>\n<blockquote>\n<p>Hack\u00ader sp\u00fcren Sicher\u00adheit\u00adsl\u00fcck\u00aden auf, ohne diese f\u00fcr ihren Vorteil zu nutzen oder Schaden anzuricht\u00aden.<\/p>\n<\/blockquote>\n<p>Was \u201cAnon\u00adLeaks\u201d \u2014 den Behaup\u00adtun\u00adgen von \u201ct\u2011online\u201d zum Trotz \u2014 <a href=\"https:\/\/anonleaks.net\/2021\/optinfoil\/could-anonymous-hack-kenfm-de-yes-we-ken\/\">angestellt hat:<\/a><\/p>\n<blockquote>\n<p>Das schrie f\u00f6rm\u00adlich nach Deface\u00adment \u2013 nat\u00fcr\u00adlich nach\u00addem man die Dat\u00aden gesichert hat\u00adte. Denn im Falle KenFM musste es ein Wipe &amp; Fullde\u00adface sein. Es blieb nur noch das, was Anony\u00admous hin\u00adter\u00adlie\u00df.<\/p>\n<\/blockquote>\n<p>Was die Ver\u00adant\u00adwortlichen f\u00fcr den Bl\u00f6dsinn also nicht sind:<\/p>\n<blockquote>\n<p>Hack\u00ader<\/p>\n<\/blockquote>\n<p>Kreative Beschimp\u00adfungsvorschl\u00e4ge, die man f\u00fcr das am\u00fcsante H\u00e4u\u00adflein stattdessen k\u00fcn\u00adftig ver\u00adwen\u00adden sollte, nehme ich gern ent\u00adge\u00adgen. Es ist Son\u00adntag, da bin ich selb\u00adst tra\u00addi\u00adtionell <del>faul<\/del> unkreativ. Derzeit tendiere ich noch zu \u201ckrim\u00adinelle Spin\u00adner\u201d, was mir selb\u00adst etwas lang\u00adweilig erscheint.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Was \u201ct\u2011online\u201d behauptet, was Hack\u00ader sind: Die Hack\u00ader suchen nach Schwach\u00adstellen in der Struk\u00adtur von Inter\u00adne\u00adtauftrit\u00adten, um Rechte und Zugriffe zu bekom\u00admen. (\u2026) Anony\u00admous bere\u00adit\u00adet die Ent\u00addeck\u00adun\u00adgen dabei in eige\u00adnen Tex\u00adten auf. Was Hack\u00ader allerd\u00adings auch sind: Hack\u00ader sp\u00fcren Sicher\u00adheit\u00adsl\u00fcck\u00aden auf, ohne diese f\u00fcr ihren Vorteil zu nutzen oder Schaden anzuricht\u00aden. Was \u201cAnon\u00adLeaks\u201d \u2014 den \u2026<\/p>\n<p><a href=\"https:\/\/tuxproject.de\/blog\/2021\/06\/optinfoil-das-gegenteil-von-hacken\/\" class=\"more-link\">\u2018#OpT\u00adin\u00adfoil: Das Gegen\u00adteil von Hack\u00aden\u2019 weit\u00ader\u00adlesen \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"footnotes":""},"categories":[13,19],"tags":[],"series":[],"class_list":["post-17946","post","type-post","status-publish","format-standard","hentry","category-in-den-nachrichten","category-nerdkrams"],"share_on_mastodon":{"url":"","error":""},"wp-worthy-pixel":{"ignored":true,"public":null,"server":null,"url":null},"wp-worthy-type":"normal","_links":{"self":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts\/17946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/comments?post=17946"}],"version-history":[{"count":0,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts\/17946\/revisions"}],"wp:attachment":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/media?parent=17946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/categories?post=17946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/tags?post=17946"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/series?post=17946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}