Jump to content

ChainScriptz_Bot

Administrators
  • Content Count

    168
  • Joined

  • Last visited

  • Days Won

    3

ChainScriptz_Bot last won the day on February 18

ChainScriptz_Bot had the most liked content!

Community Reputation

5 Neutral
1 Follower
 
   

About ChainScriptz_Bot

  • Rank
    Administrator

Profile Information

  • Gender
    Not Telling
Recent Profile Visitors
 
 
4,467 profile views
 
  1. Description In today's age of hackers and spies, it's absolutely essential to protect your browsing activity by using a VPN. FastestVPN offers a smart, easy-to-use service for all devices including Windows, Mac, iOS, Android, Smart TV and your router. As the name implies, this high-powered VPN operates with 99.9% uptime and gives you access to more than 350 high-speed servers around the globe. Plus, with a NAT firewall, ad blocker, anti-malware software, and a strict no logging policy, FastestVPN is extremely committed to your online security. P2P optimized servers let you download & stream HD video w/ zero buffering and complete anonymityUtilizes military-grade 256-bit AES encryption on all of its 350+ serversUnlimited server switches and bandwidthNAT firewall provides an additional layer of protectionMalware protection ensures the sites you visit are safe to accessAd blocker prevents unfavorable ads from popping up on your screenInternet kill switch protects your IP from being exposed if your connection dropsNo logging policy guarantees nobody will ever have your private informationBypass geo-restrictions & unlock any site you wantSupports USA NetflixSplit tunneling grant you access to choose which app to use through VPN tunnelingSmart Connect lets you connect to the fastest serverUse on 5 different devices at onceReviews TenBestVPNs: "FastestVPN is one of the most promising VPN services in the market."System Requirements WindowsAndroidMacRouteriOSKodiPS4XboxRokuRaspberry PiApple TVOpenELECKindleImportant Details Redemption: must redeem within 30 days of purchaseLength of access: lifetimeRestrictions: up to 5 simultaneous connections200+ servers in 27+ countriesUnlimited bandwidth256-bit AES encryptionZero loggingAd blockerNAT firewallAnti-malware24/7 technical supportUnlimited server switchesInternet kill switchAbout the Developer FastestVPN is a Cayman Island-based company that brings you a team of dedicated IT specialists who are truly committed to providing you a seamless blend of fast and secure network connection. https://deals.thehackernews.com/sales/fastestvpn-lifetime-subscription
  2. So what do we mean when we say “then, the post is reviewed by an AI?” TikTok is the most extensive content moderation system that has ever existed. The 411 on content moderation To make that claim, we need to understand the status quo in moderation today. Content moderation was one of the first product problems of user-generated content that computer-vision scientists were tasked with solving (ie. filtering out porn). With very little content moderation on one end of the spectrum (like 4chan) and heavy moderation on the other end (like TikTok), “what’s the right balance?” is a complex product question that touches all the major platforms today — especially when you as a consumer might not even be aware that it’s being filtered out because of the “content bubbles” we live in. From a product perspective, designing for content usually only involves three variations on a theme: Search: goal-oriented, I know what I’m looking for (Google)Browse: aimless, not sure what I want, anything good? (Netflix)Contextual: finding something else along the way (Wikipedia)Read more here : https://techcrunch.com/2020/02/17/how-tiktok-decides-who-to-make-famous/
  3. Billy-Bob walks into a bar and says, "Bartender, one round for everyone, on me!" The bartender says, "Well, seems you're in a really good mood tonight, hm?" Billy-Bob says, "Oh, you can bet on it! I just got hired by the city to go around and remove all the money from parking meters. I start on Monday!" The bartender congratulates him and proceeds to pour the round. Monday evening arrives. Billy-Bob comes back into the bar and says, "Bartender, two rounds for everyone, on me!" The bartender says, "Well now! If you're so happy just over having this new job, I can just imagine how happy you'll be when you get your paycheck!" Billy-Bob looks at the bartender with a wondrous look on his face, pulls out a handful of quarters from his pocket, and says, "You mean they'll PAY me too?"
  4. "An old, blind cowboy wanders into an all-girl biker bar by mistake... He finds his way to a bar stool and orders a shot of Jack Daniels. After sitting there for a while, he yells to the bartender, 'Hey, you wanna hear a blonde joke?' The bar immediately falls absolutely silent. In a very deep, husky voice, the woman next to him says, 'Before you tell that joke, Cowboy, I think it is only fair, given that you are blind, that you should know five things: 1. The bartender is a blonde girl with a baseball bat. 2. The bouncer is a blonde girl with a 'Billy-Club'. 3. I'm a 6-foot tall, 175-pound blonde woman with a black belt in karate. 4. The woman sitting next to me is blonde and a professional weight lifter. 5. The lady to your right is blonde and a professional wrestler. 'Now, think about it seriously, Cowboy ... do you still wanna tell that blonde joke?' The blind cowboy thinks for a second, shakes his head and mutters, 'No ... not if I'm gonna have to explain it five times"... source: https://www.uglyhedgehog.com
  5. Another WordPress plugin has now joined the list of plugins exhibiting threatening security flaws. This time, the vulnerability appeared in the GDPR Cookie Consent plugin and risked the integrity of 700,000 websites. GDPR Cookie Consent Plugin Vulnerability Reportedly, a researcher from NinTechNet, Jerome Bruandet, has discovered a serious vulnerability in the GDPR Cookie Consent plugin. The bug, considering the 700,000+ active installations of the plugin, could have risked thousands of websites. As explained in a blog post, Bruandet, found a critical XSS flaw in the plugin that existed due to lack of capability checks in AJAX endpoint. In turn, it exposed the values autosave_contant_data and save_contentdata, enabling an attacker to conduct malicious activities. Specifically, exploiting save_contentdata could have let an adversary to pull published data offline, or entirely delete it. Whereas, exploiting autosave_contant_data could allow injecting malicious JavaScript codes to the site. Alongside Bruandet, the team Wordfence has also reviewed this vulnerability after they noticed updates in the plugin. The flaw particularly caught their attention after the plugin was closed for review, as stated in their post. They have deemed the bug a critical severity flaw with a CVSS score of 9.0. Patch Rolled Out The researcher Bruandet found the vulnerability and reported it to the plugin developers on January 28, 2020. The bug affected plugin versions until 1.8.2. Consequently, the developers patched the vulnerability with the release of GDPR Cookie Consent v.1.8.3. Since the fix is out, users must ensure they update their plugin to the latest versions to prevent potential exploits. GDPR Cookie Consent is a dedicated WordPress plugin that facilitates site admins in ensuring site compliance with GDPR. Earlier this year, WordFence team also discovered vulnerabilities in other WordPress plugins that also threatened thousands of users. These vulnerable plugins include Code Snippets, WP Time Capsule, and InfiniteWP Client.
  6. A new app from Facebook’s new products division looks an awful lot like Pinterest, The Information reports. Hobbi is a photo-sharing app where you can “capture and organize your creative process” like cooking, baking, arts and crafts, fitness or home decor, according to its page in the App Store. Aimed at hobbyists, the app organizes photos of projects into collections so users can track their progress over time, TechCrunch notes. It doesn’t have a social sharing component, but Hobbi can be used to create videos of projects after they’re finished.
  7. Another wave of ransomware attacks are targeting systems with a novel strategy. As discovered by researchers, the new ransomware campaign installs malicious Gigabyte drivers on target devices to evade defense mechanisms. Ransomware Campaign Uses Malicious Gigabyte Drivers Researchers from the Sophos Labs have unveiled an active ransomware campaign exploiting Gigabyte drivers. As shared in their report, the new ransomware attack evades security checks by installing malicious Gigabyte drivers on target systems. The researchers investigated two different ransomware incidents involving Robinhood ransomware. In both cases, the attackers also installed signed drivers on the systems to disable the antivirus solution or any other security program. Digging further revealed that the attackers have exploited a known vulnerability CVE-2018-19320 in the Gigabyte drivers. While the vendors have withdrawn the vulnerable drivers, the drivers still exist. Moreover, the drivers still bear digital signatures from Verisign who have not revoked the certificates. Thus, the attackers continue to exploit the drivers for waging ransomware attacks on high-profile targets. As stated by the researchers, In this attack scenario, the criminals have used the Gigabyte driver as a wedge so they could load a second, unsigned driver into Windows. This second driver then goes to great lengths to kill processes and files belonging to endpoint security products, bypassing tamper protection, to enable the ransomware to attack without interference. The malware places numerous files to the ‘temp’ folder of the target system, which then further execute malicious activities. The table below gives a quick glimpse of these files. Source: Sophos More details about the attack scenario are available in the researchers’ post. Possible Mitigations Earlier, having a robust antimalware solution was considered sufficient for protecting against a malware/ransomware attack. However, now, when more and more ransomware are adopting different tactics to evade security checks, an antivirus no more remains a dependable solution. The same applies to Robinhood ransomware attacks as well. Therefore, Sophos recommends employing multiple measures to ensure security. These include the use of multi-factor authentication, having complex passwords, restricting access of users to critical systems/networks, maintaining up-to-date backups, and limiting RDP. Users must also ensure activating the Tamper Protection feature of their respective security solution to prevent any malware from disabling the endpoint security. Read more here: https://latesthackingnews.com/2020/02/12/new-ransomware-attacks-install-malicious-gigabyte-drivers-to-disable-antivirus/
  8. You might think that IRC (Internet Relay Chat), a chat protocol first developed in 1988, has gone the way of the dinosaur. But, according to Wikipedia, the most popular IRC networks still serve over half a million users at a time, and IRC still has some unique uses that might surprise you. One of the most popular IRC clients, mIRC (which you can download here), allows you to load scripts into it that can be used for a variety of purposes. I’ve listed a few of those scripts here. Each has a completely different purpose, from showing computer statistics to playing trivia games to hosting file servers. If you haven’t used IRC before, maybe these scripts will give you a reason to give it a try (and maybe even make your own IRC channel); if you have used it before but not recently, perhaps they can help rekindle an old love. I’m sure they’ll show you some of the unique purposes that you can use IRC for besides just chatting! DarkEngine The DarkEngine Script is useful for seeing your computer’s statistics, like how much hard drive space is free, your current uptime (and record uptime), and your current RAM and CPU use. Although there are other programs that can do this, DarkEngine is thorough and quick, and it can be used to easily compare your stats with other IRC users. To set it up, all you have to do is unzip the DarkEngine script files into the mIRC directory and then type /load -rs de4.mrc in mIRC. Now right-click on a blank space on the mIRC chat window and you’ll see a new option called DarkEngine DLL. Hover over it and you’ll see a long list of options; from here, you can choose the statistics that you want to be posted into the chat window you’re in. Ads by Google Tat’s Trivia Bot Tat’s Trivia Bot is the best trivia bot for IRC. It comes preloaded with almost 8000 questions, so you’ll have to play it for a pretty long time before you run into any repeats; and it’s heavily customizable without requiring any messy text file editing. To set it up, first unzip the trivia bot files and move them into your mIRC directory. Then type /load -rs trivscript.mrc in mIRC. Now right-click in a blank space on the mIRC chat window and you should see a new menu option that says Trivia. Hover over it and then click Trivia Options. Now in the first tab under Channels at the top, you simply need to click Add and type the name of the channel that the trivia bot will be operating in. And then you’re good to go. But you’ve probably noticed the sheer number of options available in that menu. You pretty much have control over everything, including the length of time between questions and hints, what answers will be accepted, and text colors used. Be sure to explore all of the options for awhile and choose the settings that are best for your game (don’t be afraid to experiment!). You can even write your own questions easily by adding them to the questions.txt file. For a less traditional (but fun) variation on trivia, I recommend writing questions pertaining to inside jokes that only regular visitors to the IRC channel could answer. SysResetSysReset is the most popular mIRC script that enables you to host a file server. You can use it to allow other users to download files from you. To set it up, you have to download either the full installation, which comes with mIRC; or, if you already have mIRC, the upgrade pack. After running the installer and opening mIRC, you should find an option called SysReset in the menu bar at the top. From that menu, select the first option, File Server Manager. Now go to the File Server Triggers tab. First, make sure you check the box under Trigger Global Settings, between Respond to: and !list. Then, in the Fserve Trigger List section, click Add. You will be prompted to type in a name for your file server. Next you will be prompted to select a welcome file; you can skip this for now by clicking Cancel. Then you have to select the server root””the folder that you will be allowing users to access and download files from. Finally, return to the SysReset option on the menu bar and hover over Servers Active near the bottom. Select On from this menu. Now your file server should be ready to be used. To test whether it works, you should connect to a server and join a channel. Then type /server -m <server> -j <channel> to join the same channel as a second user. Now, if you type !list, you should receive a message containing the trigger that users have to type to access your file server. Copy and paste that trigger and hit enter. If all goes well, a new tab should open and you should connect to the file server. Typing dir will list files and folders, cd <folder> will allow you to see the contents of another folder, and get <file> will start a download or place you in the queue for a download. SysReset has tons of features that you can customize. From the File Server Manager menu you can change your text colors, how many files can be downloaded at a time or be queued for download, and much more. Experiment a little and find out what works best for you. ConclusionIf you’re a long-time IRC user, you’ve probably encountered plenty of other mIRC scripts out there. What are some of your favorites?
  9. In 2018, Google executive T. Jay Fowler confirmed on Twitter that the company planned to migrate Google Play Music subscriber catalogs, playlists, and preferences over to YouTube Music, which at the time it had just re-relaunched as its own paid streaming service with Fowler at the helm. A few months shy of two years later, 9to5Google reports that Google has developed an internal beta version of YouTube Music that may add at least some of this long-awaited functionality. Specifically, 9to5Google says the new version adds support for user-uploaded music — one of the best features of Google Play Music. It might not sound exciting to everyone, but humor me for a moment. Music streaming services have almost everything you might imagine listening to in the cloud. But a user-uploaded music feature is great to have in those rare instances when a particular artist or album isn’t available to stream. Being able to upload files yourself without having to use a different music app is wonderful. There’s no indication as to whether this internal version of YouTube Music also includes playlist and preference migration, as was promised in 2018. The Verge has reached out to Google for comment on this development. Google originally told The Verge it planned to transition Play Music subscribers to YouTube Music in 2019. That obviously didn’t happen, but this may be a sign that 2020 could be the year when YouTube Music absorbs more of its Google predecessor and becomes a serious music streaming service.
  10. ChainScriptz_Bot

    IRCv3

    IntroductionIf you’re just getting started with IRC development, the first thing to look at would be the IRC core specifications RFC1459 and RFC2812. One of our members has also been writing a new core protocol document here, which you may find useful to consult. After that, our specifications page contains the extensions the IRCv3 Working Group has developed. All of the IRCv3 extensions are backwards-compatible with older IRC clients, and older IRC servers. Our roadmap details the specifications we have in the pipeline, and our GitHub repository is where most of our specification work is done. For any other questions, feel free to consult our FAQ page which contains all sorts of info about us and what we do. If you’re interested in talking with us, our discussion channel is #ircv3 on Freenode [webchat]. IRCv3 FeaturesStandardised account login using SASL to speed up registration and authentication. [3.1] [3.2]Providing the account information of other clients for the development of more advanced client features. [1] [2] [3]Optional metadata able to be attached to each message for easier, standardised extension development. [link]Instant away notifications, to let users know when other users go away or come back more quickly. [link]Showing the actual time a message was received, improving history playback from IRC bouncers. [link]Grouping related messages to simplify collapsing and display of those messages to users. [link]More Info : https://www.irccloud.com/
  11. WhatsApp For Desktop Flaws Discovered Security researcher Gal Weizman from PerimeterX has discovered numerous security flaws in the WhatsApp Desktop Platform. As revealed in his report, these vulnerabilities could allow an adversary to gain access to the local file system. In brief, when he started testing WhatsApp, he found two vulnerabilities that affected all major WhatsApp platforms. That is, WhatsApp for Android, iOS, Mac, Windows, and web versions. These vulnerabilities were not difficult to exploit but certainly had a malicious impact. One of these was a simple alteration of text messages via WhatsApp Web by altering one line of code. Whereas, the other vulnerability allowed altering banners of the links shared in WhatsApp conversations. Such an alteration could allow an adversary to redirect users to malicious links by showing them false banners and misleading messages with them. The researcher could continue the exploitation of the bugs from the simple open-redirects to achieve persistent XSS whilst bypassing the WhatsApp Content Security Policy (CSP) and, further, to achieve read access to the local file system. It was all possible since WhatsApp was not running on the latest version of Electron – a Chromium-based application that facilitates in building native apps. Since the XSS existed in the older Chromium versions, the older Electron versions also became vulnerable to such attacks. As stated by the researcher, If WhatsApp would have updated their Electron web application from 4.1.4 to the latest which was 7.x.x at the time this vulnerability was found(!) – this XSS would never have existed! Such exploitation also had the potential for remote code execution. Precise details about the exploitation are available in his article. Facebook Patched The Vulnerabilities Facebook has also confirmed the existence of these vulnerabilities (CVE-2019-18426) in the WhatsApp Desktop platform. As stated in their advisory, A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message. Facebook confirmed that the vulnerability affected “WhatsApp Desktop prior to v0.3.9309 paired with WhatsApp for iPhone versions prior to 2.20.10”.Source: Latesthackingnews
  12. Scammers were found to have registered two websites that look similar to the original PayPal website. The targeted users are sent a message that contains links to one of these websites. Crooks are tricking users into sharing their personal details and login credentials in a new PayPal SMS scam. How does it happen? As reported by Naked Security, scammers have registered two websites that look similar to the original PayPal website. The targeted users are sent a message that contains links to one of these websites. These messages are designed in such a way that it creates a sense of urgency among the recipients. The messages read as ‘Due to a recent failed payment request your account has been restricted’ or ‘We have detected unusual activity on your account’. The message further prompts the recipient to fill in their personal details in order to prevent their accounts from being locked. What next? Once the unsuspecting user clicks on the website, they are presented with a bogus PayPal site that prompts them to provide their username and password. After the login credential is entered, the victim is shown another phishing page that asks for more personal details such as full name, date of birth, address, and phone number. As part of the verification process, the victim is also asked to share their payment card details. What to do to stay safe? Don’t rely on links sent you over the message because they can be used to phish your personal details. Always type the address on the address bar to visit the website. Hover over the links sent through a message or an email to know the origin of the URL. Crooks usually disguise the links in order to deceive users. source: cyware.com
  13. Like many of today’s browsers, Firefox has been making changes to try to answer its users’ call for more online privacy. This includes blocking third-party trackers by default as well as a VPN it calls the Firefox Private Network. Firefox provides a number of tools to help protect you against tracking by first-party cookies (which are usually used for things like remembering your login information) and third-party tracking cookies (which are often used by advertisers and others to collect information and track your online behavior). Below are step-by-step instructions on how to adjust the settings to maximize protection against cookies or eliminate them altogether. We also look at how Firefox is dealing with fingerprinting, which tracks you by aggregating small details about your system configuration and creating an identifiable “fingerprint.” Keep in mind that any privacy issues that Firefox doesn’t handle may be fixable by using extensions and apps. DEAL WITH TRACKERS Firefox has blocked trackers by default since September 2019 using a customizable feature called Enhanced Tracking Protection. Enhanced Tracking Protection doesn’t block all third-party trackers, though; it blocks trackers on the Disconnect list, which is a list of known trackers. It also blocks any cross-site tracking cookies but allows first-party cookies by default. You can check if Enhanced Tracking Protection is enabled by checking the small shield icon to the left of the address bar. If the icon is purple, Firefox is blocking trackers. If it’s gray, there are no trackers to block. If it’s gray and crossed out, tracking protection is disabled for that site. ADJUST YOUR TRACKING SETTINGS You can quickly enable or disable Enhanced Tracking Protection by clicking on the shield icon; the first line in the drop-down box will let you toggle it on or off. If you want to make more specific tweaks, you can do that as well. Click on the shield icon, and then select “Cross-Site Tracking Cookies” to see which cookies Firefox is blocking Click the “Manage Protection Settings” link at the bottom of that list. You can also access the next menu by going into “Options” and clicking “Privacy and Security.” Either will bring you to the Enhanced Tracking Protection page where you can choose either Standard, Strict, or Custom protection. (This last setting allows you to specify which trackers Firefox blocks.) CLEAN UP YOUR COOKIES There are other ways to personalize your security settings from the Enhanced Tracking Protection page: Scroll down to “Cookies and Site Data” and click the “Manage Data...” button. Click on a site name and then the “Remove Selected” button to delete all of the cookies left by a specific site. You can also remove all of the cookies stored on your browser by clicking the “Remove All” button. Click the “Manage Permissions...” button under “Cookies and Site Data” to customize settings for particular websites. Enter in a website, and then click either “Block,” “Allow for Session,” or “Allow.” To delete the cookies and other data currently stored by your browser, click “Clear Data.” A window will open — make sure the box next to “Cookies and Site Data” is checked and then click “Clear.” A second window will pop up; click “Clear Now” to continue. You can also check “Delete cookies and site data when Firefox is closed.” FINGERPRINTING AND AD-BLOCKING Firefox is currently experimenting with a feature it called Fingerprinting Protection, which warns you if a site tries to extract data (which is possible for the purposes of creating a fingerprint). It also looks at a number of other factors that could be picked up and used by a fingerprinter, such as your keyboard layout and time zone. Firefox’s directions page warns that trying its Fingerprinting Protect now could “degrade your web experience.” That being said, if you’d like to give it a go: Type about:config in the address bar, and click on the button to indicate you accept the risk Click on the “Show All” link that appears above the next warning You’ll get a long list of settings. Use the top search box to find “privacy.resistFingerprinting.” If the setting is in normal type and labeled “false,” then click the toggle button on the right to enable it. (If it’s already bolded and labeled “true,” then it’s possible, according to Facebook, that one of your extensions has already turned the feature on.) Firefox does not offer native ad-blocking, but it does provide a list of suggested ad-blocking extensions. source: www.theverge.com
  14. More than 41 million videos of child sexual abuse were reported to the National Center for Missing and Exploited Children in 2019, partly because the videos have become easier for technology platforms like Facebook and Snapchat to detect, The New York Times reports. Just five years ago, the number of videos reported was less than 350,000. A record-breaking 70 million total images and videos were reported to the center last year; many of them were reported more than once across multiple platforms as users shared the illegal content. Facebook reported almost 60 million photos and videos, the Times report states, based on some 15.9 million reports. Facebook tells The Verge that not all of that content is considered “violating” and that only about 29.2 million met that criteria. Google reported 3.5 million total videos and photos in about 449,000 reports, and Imgur reported 260,000 photos and videos based on about 74,000 reports. It’s worth noting that the number of reports and the number of actual images discovered weren’t always proportional. For instance, Dropbox only made about 5,000 reports in 2019, but found more than 250,000 photos and videos, according to the Times. Apple was apparently one of the lower-reporting big companies, tipping 3,000 images and no videos. And Amazon was almost entirely absent from the list. It makes sense that Facebook would have the highest number of reports; it’s the largest social media platform with more than 2.3 billion users. And last August, Facebook open-sourced the algorithms it uses to identify child sexual exploitation and other graphic content on its platform, so it could remove such content more quickly, which may have played a role in its much higher number. So even though it’s number one on this list, that may be because it’s actively doing more to find this content. “The size and expertise of our team, together with our sophisticated technology, have made us industry leaders in detecting, removing and reporting these images, and thwarting people from sharing them,” Antigone Davis, Facebook global head of safety said in a emailed statement to The Verge, adding that the company “would continue to develop the best solutions to keep more children safe.” But even with better detection of video content, it’s still not possible to fully map the problem of online videos of child sexual abuse. As the Times notes, some cloud storage services, including Amazon, don’t scan for illegal content. And content on Apple’s messaging app is encrypted, so Apple can’t scan it to find illegal material. Privacy is at the heart of a debate over how to detect and remove this content without introducing unnecessary friction for users. Facebook is considering moving toward encryption, but taking a lot of flak for it for it. And a draft bill to create a National Commission on Online Child Exploitation Prevention would reduce legal protections for websites while establishing rules for detecting and removing content that exploits children — potentially including limits on encryption.
  15. An enterprising cybersquatter who is not Patrick deWitt has commandeered patrickdewitt.net in an attempt to attract attention for their own novel (as first reported by LitHub). And while the squatter has backed off some of his more audacious demands by scrubbing them from the website, screenshots and archived versions of the site still exist because this is the internet and that’s how things work around here. It’s slightly different than what most people think of as cybersquatting, since the person currently in control of patrickdewitt.net doesn’t appear to be asking for payment to return control of the site. The person actually seems disappointed that so far, deWitt hasn’t even acknowledged the situation. They just really, really want deWitt to read the excerpt of their unpublished novel, In God’s Silence, Them Devils Sang, which the morbidly curious can read on the fake website (with disclaimers on every page stating “this is not Patrick deWitt”). “I DON’T THINK [DEWITT] EVEN USES THE INTERNET...” The problem with the scheme is that, as the squatter discovered, deWitt apparently doesn’t really use the internet much. ”I kinda thought I could blackmail his publishers into reading it,” the squatter told Willamette Week. “Turns out I was wrong. No one gave a fuck. No one’s really emailed that website, except the odd confused person trying to tell him off for his characters being cruel to animals or some similar gibberish. I don’t think [deWitt] even uses the internet.” The Verge reached out to the squatter, who didn’t want to be interviewed unless we agreed to keep them anonymous. (We declined). Since our initial email exchange, however, their more aggressive demands have been removed from the website (but they live on elsewhere): 26 people are talking about this The contact page has since been scrubbed of everything except “this is not Patrick deWitt.” Likewise, the “about” page used to have an appeal to deWitt, as an archived version of the page shows: But that’s now gone, too. Overall, the squatter’s plan seemed, at best, a little undercooked; even if deWitt and his people read the manuscript and somehow got it published, what was the next step? Remain anonymous forever? HarperCollins, the actual deWitt’s publisher, did not respond to an email from The Verge seeking comment. It’s not clear what recourse deWitt or his representatives might have if they wanted to pursue the squatter, but under the Anti-Cybersquatting Piracy Act (ACPA), a trademark owner can bring action against someone who registers a domain name for a variety of reasons including a bad faith intent to profit from the mark. It probably would have been easier to just start a blog? read more here : https://www.theverge.com/2020/2/5/21125055/squatter-website-patrick-dewitt-novels-unpublished-author-writer-backfire

Copywrite © 2020 ChainScriptz

×
  • Create New...