{"id":17946,"date":"2021-06-13T15:01:27","date_gmt":"2021-06-13T13:01:27","guid":{"rendered":"https:\/\/tuxproject.de\/blog\/?p=17946"},"modified":"2021-06-13T15:01:27","modified_gmt":"2021-06-13T13:01:27","slug":"optinfoil-das-gegenteil-von-hacken","status":"publish","type":"post","link":"https:\/\/tuxproject.de\/blog\/2021\/06\/optinfoil-das-gegenteil-von-hacken\/","title":{"rendered":"#OpT\u00adin\u00adfoil: Das Gegen\u00adteil von Hacken"},"content":{"rendered":"<p>Was \u201et\u2011online\u201c <a href=\"https:\/\/www.t-online.de\/digital\/internet\/id_90210832\/hackerangriff-auf-ken-jebsen-anonymous-attackiert-kenfm-.html\">behaup\u00adtet<\/a>, was Hacker sind:<\/p>\n<blockquote>\n<p>Die Hacker suchen nach Schwach\u00adstel\u00adlen in der Struk\u00adtur von Inter\u00adnet\u00adauf\u00adtrit\u00adten, um Rech\u00adte und Zugrif\u00adfe zu bekom\u00admen. (\u2026) Anony\u00admous berei\u00adtet die Ent\u00addeckun\u00adgen dabei in eige\u00adnen Tex\u00adten auf.<\/p>\n<\/blockquote>\n<p>Was Hacker aller\u00addings <a href=\"https:\/\/www.innotruck.de\/mobile-ausstellung\/exponatkatalog\/cybersicherheit\/cybersicherheit-hacker\">auch sind:<\/a><\/p>\n<blockquote>\n<p>Hacker sp\u00fc\u00adren Sicher\u00adheits\u00adl\u00fccken auf, ohne die\u00adse f\u00fcr ihren Vor\u00adteil zu nut\u00adzen oder Scha\u00adden anzu\u00adrich\u00adten.<\/p>\n<\/blockquote>\n<p>Was \u201eAnon\u00adLeaks\u201c \u2013 den Behaup\u00adtun\u00adgen von \u201et\u2011online\u201c zum Trotz \u2013 <a href=\"https:\/\/anonleaks.net\/2021\/optinfoil\/could-anonymous-hack-kenfm-de-yes-we-ken\/\">ange\u00adstellt hat:<\/a><\/p>\n<blockquote>\n<p>Das schrie f\u00f6rm\u00adlich nach Defa\u00adce\u00adment \u2013 nat\u00fcr\u00adlich nach\u00addem man die Daten gesi\u00adchert hat\u00adte. Denn im Fal\u00adle Ken\u00adFM muss\u00adte es ein Wipe &amp; Full\u00adde\u00adface sein. Es blieb nur noch das, was Anony\u00admous hin\u00adter\u00adlie\u00df.<\/p>\n<\/blockquote>\n<p>Was die Ver\u00adant\u00adwort\u00adli\u00adchen f\u00fcr den Bl\u00f6d\u00adsinn also nicht sind:<\/p>\n<blockquote>\n<p>Hacker<\/p>\n<\/blockquote>\n<p>Krea\u00adti\u00adve Beschimp\u00adfungs\u00advor\u00adschl\u00e4\u00adge, die man f\u00fcr das am\u00fc\u00adsan\u00adte H\u00e4uf\u00adlein statt\u00addes\u00adsen k\u00fcnf\u00adtig ver\u00adwen\u00adden soll\u00adte, neh\u00adme ich gern ent\u00adge\u00adgen. Es ist Sonn\u00adtag, da bin ich selbst tra\u00addi\u00adtio\u00adnell <del>faul<\/del> unkrea\u00adtiv. Der\u00adzeit ten\u00addie\u00adre ich noch zu \u201ekri\u00admi\u00adnel\u00adle Spin\u00adner\u201c, was mir selbst etwas lang\u00adwei\u00adlig erscheint.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Was \u201et\u2011online\u201c behaup\u00adtet, was Hacker sind: Die Hacker suchen nach Schwach\u00adstel\u00adlen in der Struk\u00adtur von Inter\u00adnet\u00adauf\u00adtrit\u00adten, um Rech\u00adte und Zugrif\u00adfe zu bekom\u00admen. (\u2026) Anony\u00admous berei\u00adtet die Ent\u00addeckun\u00adgen dabei in eige\u00adnen Tex\u00adten auf. Was Hacker aller\u00addings auch sind: Hacker sp\u00fc\u00adren Sicher\u00adheits\u00adl\u00fccken auf, ohne die\u00adse f\u00fcr ihren Vor\u00adteil zu nut\u00adzen oder Scha\u00adden anzu\u00adrich\u00adten. Was \u201eAnon\u00adLeaks\u201c \u2013 den \u2026<\/p>\n<p><a href=\"https:\/\/tuxproject.de\/blog\/2021\/06\/optinfoil-das-gegenteil-von-hacken\/\" class=\"more-link\">\u2018#OpT\u00adin\u00adfoil: Das Gegen\u00adteil von Hacken\u2019 wei\u00adter\u00adle\u00adsen \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[13,19],"tags":[],"series":[],"class_list":["post-17946","post","type-post","status-publish","format-standard","hentry","category-in-den-nachrichten","category-nerdkrams"],"share_on_mastodon":{"url":"","error":""},"wp-worthy-pixel":{"ignored":true,"public":null,"server":null,"url":null},"wp-worthy-type":"normal","_links":{"self":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts\/17946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/comments?post=17946"}],"version-history":[{"count":0,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts\/17946\/revisions"}],"wp:attachment":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/media?parent=17946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/categories?post=17946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/tags?post=17946"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/series?post=17946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}