

@JustCallMeTimi This should help you
TREASH
3.7K posts

@Treash_01
WEB3 |Cypherpunks gonna Cyphertext|


@JustCallMeTimi This should help you


@zephyr_zig Airtime loans is a value added service. You literally don't even have to take it. And even if it was high, NCC is the one with the mandate to regulate it. Our regulatory overlaps are too many and chaotic.

🖥️🔥 Two inmates at an Ohio prison built a secret hacking operation from behind bars, using computers they were supposed to be recycling, they downloaded and sold porn in return for snacks, built a hacker toolkit with Kali Linux and password crackers, and created fake passes to move freely around the facility. All from two secret computers they built from recycling scraps and hid in a ceiling... Marion Correctional Institution in Ohio housed 2,500 inmates.. In 2014, the prison signed a deal with a recycling nonprofit called RET3 to have inmates disassemble old computers for parts. Inmates Adam Johnston and Scott Spriggs had other plans. Instead of breaking the machines down, they rebuilt two fully functioning computers from the scraps. Johnston hid the two PCs on plywood boards in the ceiling above a closet in a third-floor training room. He ran cables from the hidden machines directly into the prison's network switch. To get the computers there, he loaded them onto a hygiene cart alongside soap and shampoo. He wheeled the cart 1,100 feet across the prison, past a corrections officer, through a metal detector, into an elevator, and up three floors. Once connected, Johnston had full internet access and could remote into the hidden computers from any inmate terminal in the facility. He obtained a staff member's login credentials by shoulder surfing, watching him type his password. That password hadn't been changed in years. The prison's systems didn't enforce password rotations, in violation of their own policy. Using the stolen credentials, Johnston accessed DOTS, the state's offender tracking database. He browsed inmate records, searching for a young prisoner serving a long sentence whose identity he could steal. He found Kyle Patrick. Johnston pulled Patrick's Social Security number and date of birth from the system, bypassing a security filter that was supposed to hide SSNs by simply adjusting the browser's view settings. Johnston then applied for five credit and debit cards in Patrick's name. He texted his mother from prison using a free online messaging service and had her provide a neighbor's address across the street as the mailing address. One card, a Visa debit from MetaBank, was approved. His mother received it in the mail, called him at the prison, and read him the card number, expiration date, and activation code over the phone. Johnston activated the card from inside the prison using the hidden computers. Both the application and the activation were traced back to an Ohio state government IP address. He wasn't done. Johnston had also pulled up a Bloomberg article detailing how to file fraudulent tax returns and have refunds wired to prepaid debit cards. That was his next move. The computers were loaded with a full hacker's toolkit: Kali Linux, Wireshark, Nmap, password crackers like Cain and THC Hydra, VPN software, the Tor browser, proxy tools, and encryption software. Investigators also found articles on making homemade drugs, explosives, and fake credit cards. Johnston used DOTS to create fake passes, giving inmates unauthorized access to restricted areas of the prison. He also downloaded pornography onto thumb drives that another inmate sold to other prisoners for commissary items. The scheme only unraveled because the prison upgraded its web filtering software. In early July 2015, the new Websense system flagged Canterbury's credentials being used for three straight hours on a Friday, a day Canterbury didn't work. More alerts followed on Saturday and the following Monday. IT flagged the activity to the warden. Everyone suspected an inmate was involved. Nobody called law enforcement. The prison's IT specialist, Gene Brady, was told exactly which network port the rogue computer was plugged into. He misread the email and checked port 10 instead of port 16. It took him three days to realize his mistake. When Brady finally traced the cable into the ceiling and found the two hidden computers on July 27, he brought two inmates along to help and had them pull the computers down, contaminating the crime scene. He then emailed the warden: "What do you want me to do with the PCs?" The warden admitted he knew illegal activity was occurring but had no answer for why he never reported it to law enforcement. The state highway patrol trooper assigned to investigate crimes at the prison literally shared an office with the prison's own investigator. Neither one was informed. It wasn't until August 7, over a month after the first alert, that anyone reported the incident to the Inspector General or law enforcement. And only because an outside IT security officer told them they were required to. After the discovery, inmates immediately began wiping other prison computers with CCleaner to destroy evidence. Investigators later found the cleaning software had been run at least 10 times in two days, while inmates still had unsupervised access. Four inmates were transferred to separate prisons and placed in segregation with their phone access blocked. Johnston simply used another inmate's PIN to call his mother five more times anyway. When investigators finally seized computers across the prison, they pulled 308 machines. Of those, 291 had no inventory tags. Brady had been swapping recycling-bound computers into the prison network for years without documenting any of it. The investigation uncovered a cascade of failures: no password enforcement, no IT inventory, no crime scene protection, no reporting of illegal activity, and years of unsupervised inmate access to computers, parts, cables, and network infrastructure. The warden resigned.

This is incredible! They should get them to build a cybersecurity startup and get funded by @a16z


But that was how you got me abducted from Portharcourt on May 8, 2019 without any warrant. May be because I am just an ordinary citizen and not a former governor like you. As long as the sun rises and settles, you will surely have a taste of your medicine Mallam Nasiru Elrufai.

@thekitani @Nig_Farmer @Zaddy_Abdul Sorry to ask is it the middle belt from, Jos & Southern kd right?






APC National Chairman, Prof. Nentawe Yilwatda: “I know someone from my village whom Ahmadu Bello Sardauna took abroad to study and then brought back and placed in the police to become the first officer with a degree. Sardauna knew he was a Christian. I don’t know why people focus on the politics of religion in the north in this era. For me, if you want to become a leader in the North, you have to follow in the footsteps of what our leader, our father, Sardauna, did in the North.”





Please are you not seeing the comments of Nigerians complaining about how PayPal did them dirty? At least have some solidarity with your people. I have never used PayPal but the fact that my Nigerians are complaining bitterly about them and PayPal has not showed any remorse or explanation is enough reason for me never to use it.

I moved through Benin-Togo around 1 AM nothing happened, a smooth trip. The next return trip via Lagos-Efe. We ran into kidnappers, me and na Nigeria roads for long travels na two parallel lines. Two years of being in Togo, I've never used the Powerbank I brought from Nigeria.

I’ve been to Togo . That’s literally one state in Nigeria, The standard of living, the well constructed roads , the cheap food and clean air. I didn’t want to come back . Cefa is higher than naira but it’s cheaper to vacation in Togo than in Nigeria. These small african countries have left African giant behind .

@BTOofficial @Justolaola @Ekitiketekan @aeonalloy Oga, outsource some of these services. Let the career civil servants focus on supervision and let the private sector come in with very strict KPI's and water-tight SLA's. Your vision cannot be realized with a broken system. Allow efficiency to supercede bureaucracy.

“You're wasting people's precious time” — Olubunmi Tunji-Ojo rebukes NIS officers during an unscheduled visit to the passport office in Gwagwalada, Abuja.





@lifeinsolace SPOILER ALERT; You think this country would ever get better? With the bunch of dimwits and highly insatiable corrupted peeps holding such institutions captive. As a matter of fact, Nigeria isn't in charge of the key processes to how passports are made, they've outsourced it.



“You're wasting people's precious time” — Olubunmi Tunji-Ojo rebukes NIS officers during an unscheduled visit to the passport office in Gwagwalada, Abuja.