One Article Review

Accueil - L'article:
Source ErrataRob.webp Errata Security
Identifiant 246280
Date de publication 2016-11-03 00:20:33 (vue: 2016-11-03 00:20:33)
Titre In which I have to debunk a second time
Texte So Slate is doubling-down on their discredited story of a secret Trump server. Tip for journalists: if you are going to argue against an expert debunking your story, try to contact that expert first, so they don't have to do what I'm going to do here, showing obvious flaws.The experts didn't find anythingThe story claims:"I spoke with many DNS experts. They found the evidence strongly suggestive of a relationship between the Trump Organization and the bank".No, you didn't. You gave experts limited information and asked them whether it's consistent with your conspiracy theory. Of course it's consistent with almost any conspiracy theory you want to concoct. What you didn't ask is for experts to try to disprove the theory.Go back and ask Chris Davis and Paul Vixie which is more credible, your version of events, or my version. I will vouch that these two are really top experts in this field, and you should trust them.This is why people quoted in the press need to go through "media training", to avoid getting your reputation harmed by bad journalists who try their best to put words in your mouth. You'll be trained to recognize bad journalists like this, and how not to get sucked into their fabrications.Jean Camp isn't an expertOn the other hand, Jean Camp isn't an expert. I've never heard of her before. She gets details wrong. Take for example in this blogpost of here's where she discusses strange lookups. Specifically, she comments on lookups for the domain mail.trump-email.com.moscow.alfaintra.net. She says:This query is unusual in that is merges two hostnames into one. It makes the most sense as a human error in inserting a new hostname in some dialog window, but neglected to hit the backspace to delete the old hostname.Uh, no. It's normal DNS behavior with non-FQDNs. If the lookup for a name fails, computers will try again, pasting the local domain on the end. In other words, when Twitter's DNS was taken offline by the DDoS attack a couple weeks ago, those monitoring DNS saw a zillion lookups for names like "www.twitter.com.example.com".I don't know what Jean Camp is an expert of, but this is sorta a basic DNS concept. It's surprising she'd get it wrong. Of course, she may be an expert in DNS who simply had a brain fart (this happens to all of us), but looking across her posts and tweets, she doesn't seem to be somebody who has a lot of experience with DNS.Call up your own IT department at Slate. Ask your IT nerds if this is how DNS operates. Note: I'm saying your average, unremarkable IT nerds can debunk an "expert" you quote in your story.There is no IP address limitationThe story repeats the theory, which I already debunked, that the server has a weird configuration that limits who can talk to it:The scientists theorized that the Trump and Alfa Bank servers had a secretive relationship after testing the behavior of mail1.trump-email.com using sites like Pingability. When they attempted to ping the site, they received the message “521 lvpmta14.lstrk.net does not accept mail from you.”No, that's how Listrake (who is the one who actually controls the server) configures all their marketing servers. Anybody can confirm this themselves by ping all the servers in this range:
Envoyé Oui
Condensat  the  this 5pm 9am abound about above accept across acting activity actually address after again against ago alfa alfaintra all all their almost already also always always weird analysis analysiswell answer any any expert anybody anythingthe apart are aren argue around arrive article ask asked asks attack attempted average avoid back backspace bad bank bankthe basic because become been before behavior behind believe best between bias biggest blogpost brain breaches broken builds but call camp campaign campaigns can cendyn center certain are chance change changed changes changing checked chooses chris city claim claiming claims claims: clarity clear clearly cognitive coincidence coincidences com com were comcendyn comdenihan come comhyatt comments commjh common communications companies company complete comprehensive computer computers concept conclusionother conclusions concoct configuration configure configures confirm confusing connections consistent conspiracies conspiracy consulted contact contacted continues contract control controls convinced correct couple course credible curious current data datapoint davis day days ddos debunk debunked debunking decided deeper delete department despite details dialog did didn difference discredited discusses display disprove distribution dns documented does doesn doing domain don done doubling doubt down during dyn editing eight either email emily end engineers engines entire error errors evan even event events everything evidence example example:one expect experience expert experton experts fabrications fact facts fails faith falls fart field find finding first fits flawed flaws focus forth forward found fqdns freakin from fundamental garble gave get gets getting given goes going good gotten graph graphing graphs hack hacking had hand happens harmed has have heard heck her here highlight him hit holds home hostname hostnames hour hour:as how human humans hundreds idiots ignore impossible incoming incomplete inconsistent info information inquiries inserting instead interacting interesting intriguing investigating investigation investigations involved irrelevant isn it:the itself jean journalist journalists journalists: judgements june just know knowable last law leaves level like likewise limitationthe limited limits listrak listrak controls listrake little local logs look looking looks lookup lookups looms lot lstrk lull lvpmta14 lying made mail mail1 maintaing major make makes malware manipulated many marketing match matches may mcmullin mean meaning meaningful meaningless means media mentioned merges message messing midnight monitor monitoring more moscow most mostly mouth much my analysis name names narrow nature ndas need nefarious neglected nerds net never new news next nine non none nonetheless normal not note: nothing notice noticed notified number nytimes obvious offline old omg one only only alfa operates orgainzation organization original other outlets over own passed past pasting pattern patterns paul peaks people perfectly piece ping pingability place point point: possibly post posts press private public put queries query question question: quote quoted random range:again really reason received recognize records registrar rejects relationship removed repeats rephrasing reporters reputation research researchers running same saw saying says says:this scan scientists second secret secretive see seeing seem sending sense sept september server servers services she should show showing shown shut shutdown simply site sites slate slate is some somebody something sort sorta source spam specifically spells spike spoke stand standing states:i stood stories story strange strongly subtle such sucked sufficient suggestive supports surprising suspiciously take taken talk tea technical testing that their analysis them themselves theorized theory there these they thing things those through throughout thus time times timing tip top traffic trained training tricking trivial trump trust trustworthy try trying tweets twist twitt
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: