• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 08:39
CEST 14:39
KST 21:39
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro24 Preview Pt2: News Flash10[ASL21] Ro24 Preview Pt1: New Chaos0Team Liquid Map Contest #22 - Presented by Monster Energy18ByuL: The Forgotten Master of ZvT30Behind the Blue - Team Liquid History Book20
Community News
Weekly Cups (May 30-Apr 5): herO, Clem, SHIN win0[BSL22] RO32 Group Stage1Weekly Cups (March 23-29): herO takes triple6Aligulac acquired by REPLAYMAN.com/Stego Research8Weekly Cups (March 16-22): herO doubles, Cure surprises3
StarCraft 2
General
Weekly Cups (May 30-Apr 5): herO, Clem, SHIN win Rongyi Cup S3 - Preview & Info Team Liquid Map Contest #22 - Presented by Monster Energy Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool What mix of new & old maps do you want in the next ladder pool? (SC2)
Tourneys
Sparkling Tuna Cup - Weekly Open Tournament RSL Season 4 announced for March-April StarCraft Evolution League (SC Evo Biweekly) WardiTV Mondays World University TeamLeague (500$+) | Signups Open
Strategy
Custom Maps
[M] (2) Frigid Storage Publishing has been re-enabled! [Feb 24th 2026]
External Content
The PondCast: SC2 News & Results Mutation # 520 Moving Fees Mutation # 519 Inner Power Mutation # 518 Radiation Zone
Brood War
General
so ive been playing broodwar for a week straight. ASL21 General Discussion [BSL22] RO32 Group Stage Gypsy to Korea Pros React To: JaeDong vs Queen
Tourneys
[Megathread] Daily Proleagues [ASL21] Ro24 Group F Escore Tournament StarCraft Season 2 [ASL21] Ro24 Group E
Strategy
What's the deal with APM & what's its true value Fighting Spirit mining rates Simple Questions, Simple Answers
Other Games
General Games
Stormgate/Frost Giant Megathread Starcraft Tabletop Miniature Game Nintendo Switch Thread General RTS Discussion Thread Darkest Dungeon
Dota 2
The Story of Wings Gaming Official 'what is Dota anymore' discussion
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas TL Mafia Community Thread Five o'clock TL Mafia
Community
General
US Politics Mega-thread The Chess Thread Russo-Ukrainian War Thread NASA and the Private Sector Things Aren’t Peaceful in Palestine
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Manga] One Piece [Req][Books] Good Fantasy/SciFi books Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion Cricket [SPORT] Tokyo Olympics 2021 Thread General nutrition recommendations
World Cup 2022
Tech Support
[G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
Loot Boxes—Emotions, And Why…
TrAiDoS
Broowar part 2
qwaykee
Funny Nicknames
LUCKY_NOOB
Iranian anarchists: organize…
XenOsky
FS++
Kraekkling
ASL S21 English Commentary…
namkraft
Electronics
mantequilla
Customize Sidebar...

Website Feedback

Closed Threads



Active: 2239 users

The Anti-Sec movement

Forum Index > General Forum
Post a Reply
Normal
konadora *
Profile Blog Joined February 2009
Singapore66358 Posts
Last Edited: 2009-07-11 04:01:49
July 11 2009 02:13 GMT
#1
I've noticed that many of my images on imageshack have this same image, somewhat hijacked by this 'anti-sec movement'. Here's the image:

[image loading]


Who or WHAT is their purpose? I've read this article about it:

http://blog.ncircle.com/archives/2006/04/the_antisec_movement_why.html

Another discussion forum:
http://www.reddit.com/r/programming/comments/8r1t3/facinating_discussion_about_the_antisec_movement/

Anyone else came across this? Why are they targeting imageshack? They didn't do anything related to "full-disclosure"?

Apparently this concept of 'full-disclosure' isn't new...
http://en.wikipedia.org/wiki/Full_disclosure

Now I have to reupload all my photos for my blogs omg
POGGERS
EvilTeletubby
Profile Blog Joined January 2004
Baltimore, USA22259 Posts
July 11 2009 02:17 GMT
#2
Yeah, just happened to a pic I uploaded... what a bunch of d-bags.
Moderatorhttp://carbonleaf.yuku.com/topic/408/t/So-I-proposed-at-a-Carbon-Leaf-concert.html ***** RIP Geoff
konadora *
Profile Blog Joined February 2009
Singapore66358 Posts
July 11 2009 02:21 GMT
#3
Any other image-uploading sites affected? So far I've only used imageshack, so with half my images being hijacked with this, it's going to take me a whole day to reupload onto another site and replace the images on my blog...
POGGERS
Xeofreestyler
Profile Blog Joined June 2005
Belgium6775 Posts
July 11 2009 02:23 GMT
#4
Hopefully the imageshack crew will manage to fix it themselves
Graphics
Alsar
Profile Blog Joined January 2009
United States130 Posts
July 11 2009 02:27 GMT
#5
If they actually wanted to get across to people they should narrow down their huge essay there to like two sentences or less so people actually care to read it. ;o
GoSu
Profile Blog Joined June 2009
Korea (South)1773 Posts
July 11 2009 02:27 GMT
#6
hope too.... why are they doing that....
#1 olleh KT 팬 http://sports.kt.com/ | #1 김택용 선수 팬 | 좋은 선수: 송병구, 이제동, 도제욱, 정명훈, 이성은 | KeSPA 한국 e-Sports 협회
FragKrag
Profile Blog Joined September 2007
United States11557 Posts
July 11 2009 02:28 GMT
#7
Is this against Imageshack forcing ads onto images?

I'm not sure I understand what they're trying to do here.
*TL CJ Entusman #40* "like scissors does anything to paper except MAKE IT MORE NUMEROUS" -paper
konadora *
Profile Blog Joined February 2009
Singapore66358 Posts
July 11 2009 02:31 GMT
#8
I think they're talking about how imageshack's security is bad, so they are proving that by hijacking the images...

ffs

I have to replace like 7 months of my blog's images
POGGERS
benjammin
Profile Blog Joined August 2008
United States2728 Posts
July 11 2009 02:34 GMT
#9
i'm not a computer science person in any way, but isn't this just laughably misguided? doesn't disclosure encourage the actual creation of fixes and distribution of them on a larger scale than otherwise? sure, it allows for malicious usage, but that would exist either way, and would be more effective if there was no disclosure

i don't know what that bit about money is all about, but this just seems immature

correct me if i am wrong, my degrees are in english :D
wash uffitizi, drive me to firenze
AmorVincitOmnia
Profile Joined March 2005
Kenya3846 Posts
July 11 2009 02:36 GMT
#10
i just got this too, googled the anti-sec movement, and got this thread.
r.i.p. Bud Shank May 27, 1926 - April 2, 2009
motbob
Profile Blog Joined July 2008
United States12546 Posts
July 11 2009 02:37 GMT
#11
use photobucket!
ModeratorGood content always wins.
okum
Profile Blog Joined February 2009
France5778 Posts
July 11 2009 02:38 GMT
#12
I wouldn't use a site like Imageshack to host any image intended to last longer than an IRC session.
Flash fan before it was cool | Coiner of "jangbang"
paper
Profile Blog Joined September 2004
13196 Posts
July 11 2009 02:38 GMT
#13
FUCKING GREAT.
Hates Fun🤔
Slaughter
Profile Blog Joined November 2003
United States20254 Posts
July 11 2009 02:44 GMT
#14
Jesus I hate self righteous idiots who think they can pull shit like this off because "they are in the right so its ok to fuck with millions of photos". God I hate these people.
Never Knows Best.
Chuiu
Profile Blog Joined June 2003
3470 Posts
July 11 2009 02:46 GMT
#15
Hahaha, this is just another thing to put on my list of "REASONS NOT TO USE IMAGESHACK". Seriously there are hundreds.

Use photobucket people.
♞
ddengster
Profile Blog Joined January 2009
Singapore129 Posts
July 11 2009 02:46 GMT
#16
TLDR version: Security companies distribute exploits,etc so that they can get more people to buy their own security software, thus making more $$. These guys are attempting to break the cycle by disrupting anything that supports this cycle
Check out NEO Impossible Bosses, RTS-MOBA boss rush at http://neoimpossiblebosses.coder-ddeng.com
Vivi57
Profile Blog Joined September 2007
United States6599 Posts
July 11 2009 02:49 GMT
#17
everything on photobucket is fine
Flash hwaiting! Nal_rA forever!
AmorVincitOmnia
Profile Joined March 2005
Kenya3846 Posts
July 11 2009 02:50 GMT
#18
yeah imageshack is terrible anyways.

pretty good advertising for photobucket if nothing else.
r.i.p. Bud Shank May 27, 1926 - April 2, 2009
Stuslegend
Profile Blog Joined August 2007
Canada168 Posts
July 11 2009 02:50 GMT
#19
big companies expoiting to make $$

whats new?
stork can have my kids in his mouth any time... no homo O_O'
ddengster
Profile Blog Joined January 2009
Singapore129 Posts
July 11 2009 02:54 GMT
#20
Also reminds me of the time when someone told me antivirus companies sued microsoft for making some changes to the windows kernel that would prevent most viruses from executing. Dunno if its true or not.
This approach(hijacking imageshack) is not going to work imo.
Check out NEO Impossible Bosses, RTS-MOBA boss rush at http://neoimpossiblebosses.coder-ddeng.com
Nemesis
Profile Blog Joined May 2009
Canada2568 Posts
July 11 2009 02:58 GMT
#21
This is why I use photobucket
Lee Young Ho fighting! KT P are just CHINTOSSTIC.
konadora *
Profile Blog Joined February 2009
Singapore66358 Posts
July 11 2009 03:03 GMT
#22
I regret using imageshack now, should have used flickr -_-
POGGERS
Nightmarjoo
Profile Blog Joined October 2006
United States3360 Posts
July 11 2009 03:18 GMT
#23
On July 11 2009 11:38 paper wrote:
FUCKING GREAT.

LOL that sucks.
aka Lyra; My favourites: July, Stork, Draco, MistrZZZ, TheStc, LastShadow - www.broodwarmaps.net - for all your mapping needs; check my stream: high masters mech terran: twitch.tv/lyrathegreat
feelShinbi
Profile Joined July 2009
Canada16 Posts
July 11 2009 03:18 GMT
#24
imgur.com or skipall.com
the best hosts, bar none
Hot_Bid's a meanie.
konadora *
Profile Blog Joined February 2009
Singapore66358 Posts
July 11 2009 03:20 GMT
#25
Looks like imageshack found out, I think they're restoring the images
POGGERS
FragKrag
Profile Blog Joined September 2007
United States11557 Posts
July 11 2009 03:22 GMT
#26
I always use tinypic but you can't upload from URL there :/
*TL CJ Entusman #40* "like scissors does anything to paper except MAKE IT MORE NUMEROUS" -paper
SK.Testie
Profile Blog Joined January 2007
Canada11084 Posts
July 11 2009 03:22 GMT
#27
On July 11 2009 12:18 Nightmarjoo wrote:
Show nested quote +
On July 11 2009 11:38 paper wrote:
FUCKING GREAT.

LOL that sucks.


NOOOOOOOOOOOOO
ROOOOOOOGIE
Social Justice is a fools errand. May all the adherents at its church be thwarted. Of all the religions I have come across, it is by far the most detestable.
SWPIGWANG
Profile Joined June 2008
Canada482 Posts
July 11 2009 03:36 GMT
#28
When in doubt, hit it with Starlight breaker~~~~
konadora *
Profile Blog Joined February 2009
Singapore66358 Posts
July 11 2009 03:46 GMT
#29
On July 11 2009 12:36 SWPIGWANG wrote:
When in doubt, hit it with Starlight breaker~~~~

hehe lol
POGGERS
DeathSpank
Profile Blog Joined February 2009
United States1029 Posts
July 11 2009 04:14 GMT
#30
mmm tl. While I don't agree with full disclosure(this is actually the first I heard of it) it seems mighty counter productive to hack a bunch of sites to battle security companies.... Hey guys let's stop the money grabbing security companies by causing more havoc!! that way they consumers have more reason to buy their stuff!! LOL.
yes.
Medzo
Profile Blog Joined June 2009
United States627 Posts
July 11 2009 04:24 GMT
#31
On July 11 2009 13:14 DeathSpank wrote:
mmm tl. While I don't agree with full disclosure(this is actually the first I heard of it) it seems mighty counter productive to hack a bunch of sites to battle security companies.... Hey guys let's stop the money grabbing security companies by causing more havoc!! that way they consumers have more reason to buy their stuff!! LOL.


Pretty much QFT.
b3h47pte
Profile Blog Joined May 2007
United States1317 Posts
Last Edited: 2009-07-11 05:29:47
July 11 2009 05:29 GMT
#32
Everything in the TL dota thread seems normal? O.o

Edit: Ah wait. I'm a couple hours late. that might be why
mahnini
Profile Blog Joined October 2005
United States6862 Posts
July 11 2009 05:40 GMT
#33
On July 11 2009 13:24 Medzo wrote:
Show nested quote +
On July 11 2009 13:14 DeathSpank wrote:
mmm tl. While I don't agree with full disclosure(this is actually the first I heard of it) it seems mighty counter productive to hack a bunch of sites to battle security companies.... Hey guys let's stop the money grabbing security companies by causing more havoc!! that way they consumers have more reason to buy their stuff!! LOL.


Pretty much QFT.

well not quite. they want hackers to stop publishing the exploits they find which means any potential security holes that are found are going to be kept among hackers themselves as opposed to publishing them on a website. general consensus is that it's better when hackers publish exploits because it pushes the companies to fix the security holes or enables knowledgeable administrators to avoid making themselves vulnerable to the exploit. for some reason though these anti-sec people think the security industry is unjustly profiting from the full disclosure of exploits.
the world's a playground. you know that when you're a kid, but somewhere along the way everyone forgets it.
Chef
Profile Blog Joined August 2005
10810 Posts
July 11 2009 05:46 GMT
#34
On July 11 2009 12:20 konadora wrote:
Looks like imageshack found out, I think they're restoring the images

Oh man, imageshack's images are messed up for two hours and everyone abandons them

I still use them. I enjoy that I don't have to sign up for anything to upload files. AFIK you need to make an account to use photobucket... blaah. Then again, I haven't used photobucket in ten million years.
LEGEND!! LEGEND!!
MK
Profile Blog Joined March 2009
United States496 Posts
July 11 2009 05:46 GMT
#35
uh. Wut's bad in full disclosure ? Could someone explain me in few words ? Cuz I've read the wiki and I can't see wut's bad in : telling everyone which part sucks so someone can fix that asap.

Or maybe I've missed the point.
The highest knowledge is to know that we are surrounded by mystery
konadora *
Profile Blog Joined February 2009
Singapore66358 Posts
July 11 2009 05:48 GMT
#36
On July 11 2009 14:46 Chef wrote:
Show nested quote +
On July 11 2009 12:20 konadora wrote:
Looks like imageshack found out, I think they're restoring the images

Oh man, imageshack's images are messed up for two hours and everyone abandons them

I still use them. I enjoy that I don't have to sign up for anything to upload files. AFIK you need to make an account to use photobucket... blaah. Then again, I haven't used photobucket in ten million years.

I'm going to use flickr from now on -_-
POGGERS
epicdoom
Profile Blog Joined January 2009
United States489 Posts
July 11 2009 06:06 GMT
#37
Just wait till they attack 4chan It's a war waiting to happen
rgfdxm
Profile Joined December 2006
United States239 Posts
July 11 2009 06:13 GMT
#38
Full disclosure is not "big companies exploiting to make money." Opponents of full-disclosure are essentially advocating security by obscurity. I'm not an expert in computer security but I find it an interesting topic and loosely follow some news and blogs. Full disclosure has its drawbacks but the alternative is almost certainly worse.

It's like proposing that your country's scientists should stop publishing research openly because other people might use your ideas to build something or discover something new. The entire goal of sharing the information is that the leaders in the field have overwhelmingly decided that it's worth the costs in order to advance the field as a whole.

Without full disclosure potential exploits will be far more numerous and someone who knows what they're doing can do a lot more damage once they've found one. I'd gladly trade allowing script kiddies to get their hands on noob exploits for making the entire field of security more robust overall.
kaleidoscope
Profile Blog Joined December 2008
Singapore2887 Posts
July 11 2009 06:32 GMT
#39
Oh no wonder.. I thought i had posted a wrong link of the pic..
대지따라 돌린게 시간이다.. 흘러가고 돌아오지도 않고..
thopol
Profile Blog Joined May 2008
Japan4560 Posts
July 11 2009 07:50 GMT
#40
I see where they are coming from. At least in theory....
Fontong
Profile Blog Joined December 2007
United States6454 Posts
July 11 2009 07:54 GMT
#41
Basically, they are an eTerrorism group??

That's exactly what the little essay in the OP reminds me of. They are going to try and use eterror to make major companies stop using full disclosure...

In this case, I will support full disclosure to thwart these immature bastards.
[SECRET FONT] "Dragoon bunker"
Lemonwalrus
Profile Blog Joined August 2006
United States5465 Posts
July 11 2009 08:57 GMT
#42
On July 11 2009 15:06 epicdoom wrote:
Just wait till they attack 4chan It's a war waiting to happen

They probably are 4chan.
konadora *
Profile Blog Joined February 2009
Singapore66358 Posts
July 11 2009 09:22 GMT
#43
On July 11 2009 17:57 Lemonwalrus wrote:
Show nested quote +
On July 11 2009 15:06 epicdoom wrote:
Just wait till they attack 4chan It's a war waiting to happen

They probably are 4chan.

4chan won't be bothered to do something like this

Oh, images are being restored on imageshack now
POGGERS
DoctorHelvetica
Profile Blog Joined July 2008
United States15034 Posts
July 12 2009 00:13 GMT
#44
That's pretty ridiculous. You need to be pretty self-righteous to mess with other peoples images to make your statement.
RIP Aaliyah
teserai
Profile Blog Joined June 2009
United States15 Posts
July 12 2009 00:16 GMT
#45
You'd think they would use a less annoying method if they wanted people to support their cause. S:
Mooga
Profile Blog Joined June 2007
United States575 Posts
July 12 2009 00:55 GMT
#46
On July 11 2009 11:34 benjammin wrote:
i'm not a computer science person in any way, but isn't this just laughably misguided? doesn't disclosure encourage the actual creation of fixes and distribution of them on a larger scale than otherwise? sure, it allows for malicious usage, but that would exist either way, and would be more effective if there was no disclosure

i don't know what that bit about money is all about, but this just seems immature

correct me if i am wrong, my degrees are in english :D


See, the thing is that hackers don't want full-disclosure because it threatens to fix exploits that hackers are using faster than no-disclosure. This forces hackers to come up with novel hacks, instead of using the same method indefinitely without being detected. Of course they say that what they are doing is to stop the script kiddies, but most script kiddies use grey-hat or black-hat exploits anyway, they don't go through code and write their own, so black-hat or grey-hat hackers are still relied on anyway to develop exploits.
Physician *
Profile Blog Joined January 2004
United States4146 Posts
July 12 2009 05:28 GMT
#47
File: archives/7/p7_0x03_Hacker's Manifesto_by_The Mentor.txt
==Phrack Inc.==

Volume One, Issue 7, Phile 3 of 10

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following was written shortly after my arrest...

\/\The Conscience of a Hacker/\/

by

+++The Mentor+++

Written on January 8, 1986
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Another one got caught today, it's all over the papers. "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.

But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.

I'm in junior high or high school. I've listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.

I made a discovery today. I found a computer. Wait a second, this is
cool. It does what I want it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.

And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
"This is it... this is where I belong..."
I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...

You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been dominated by sadists, or
ignored by the apathetic. The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.

This is our world now... the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals. We seek
after knowledge... and you call us criminals. We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.

I am a hacker, and this is my manifesto. You may stop this individual,
but you can't stop us all... after all, we're all alike.

+++The Mentor+++
_______________________________________________________________________________
"I have beheld the births of negative-suns and borne witness to the entropy of entire realities...."
Badjas
Profile Blog Joined October 2008
Netherlands2038 Posts
July 12 2009 06:15 GMT
#48
Sheesh whiners, the people behind this are vindicated exactly through the proof itself. To those who don't see what they're about, read the damn thing. To those who say they are aggravated by them making you lose an image, how else are they gonna give you a wake up call for their cause, a newspaper ad?

Sure, this is not about you who use photo bucket. This is about the security industry as you can read. But just as you can lose a photo on photo bucket (big deal, you did have a backup right?), so can you receive spams by the bucketloads due to hacked zombie pc's. So can industrial espionage through hacking happen. So can a company get slandered on their own website by a hack. With everything run by computers, a lot can happen. The security industry doesn't mind, they don't get payed for the problems that have occurred and won't be held responsible, they get payed by the scared people who have been hurt before.

Who's on the moral high ground? Can't really say both are on dry land. Getting exploits fixed requires communication but surely it can be done in a way that is much less prone to black hats using those exploits.

Oh, another nice one. Why don't you people hold photo bucket responsible for not fixing their code (or updating third party software) once the exploit was published. That's the reason exploits get published, right? See the problem?
I <3 the internet, I <3 you
Badjas
Profile Blog Joined October 2008
Netherlands2038 Posts
July 12 2009 06:20 GMT
#49
On July 12 2009 09:55 Mooga wrote:
Show nested quote +
On July 11 2009 11:34 benjammin wrote:
i'm not a computer science person in any way, but isn't this just laughably misguided? doesn't disclosure encourage the actual creation of fixes and distribution of them on a larger scale than otherwise? sure, it allows for malicious usage, but that would exist either way, and would be more effective if there was no disclosure

i don't know what that bit about money is all about, but this just seems immature

correct me if i am wrong, my degrees are in english :D


See, the thing is that hackers don't want full-disclosure because it threatens to fix exploits that hackers are using faster than no-disclosure. This forces hackers to come up with novel hacks, instead of using the same method indefinitely without being detected. Of course they say that what they are doing is to stop the script kiddies, but most script kiddies use grey-hat or black-hat exploits anyway, they don't go through code and write their own, so black-hat or grey-hat hackers are still relied on anyway to develop exploits.

So most hacks come from black hats, not from white hats? Where's your source?
I <3 the internet, I <3 you
Mooga
Profile Blog Joined June 2007
United States575 Posts
July 12 2009 07:10 GMT
#50
On July 12 2009 15:20 Badjas wrote:
Show nested quote +
On July 12 2009 09:55 Mooga wrote:
On July 11 2009 11:34 benjammin wrote:
i'm not a computer science person in any way, but isn't this just laughably misguided? doesn't disclosure encourage the actual creation of fixes and distribution of them on a larger scale than otherwise? sure, it allows for malicious usage, but that would exist either way, and would be more effective if there was no disclosure

i don't know what that bit about money is all about, but this just seems immature

correct me if i am wrong, my degrees are in english :D


See, the thing is that hackers don't want full-disclosure because it threatens to fix exploits that hackers are using faster than no-disclosure. This forces hackers to come up with novel hacks, instead of using the same method indefinitely without being detected. Of course they say that what they are doing is to stop the script kiddies, but most script kiddies use grey-hat or black-hat exploits anyway, they don't go through code and write their own, so black-hat or grey-hat hackers are still relied on anyway to develop exploits.

So most hacks come from black hats, not from white hats? Where's your source?


It's a question of how the exploits are packaged and how they deliver the payload. I don't know how much you know about script kiddies, but most of them rely heavily on programs written by black-hatters/grey-hatters to deliver the payloads because they can't understand/write the code themselves.
Badjas
Profile Blog Joined October 2008
Netherlands2038 Posts
July 12 2009 07:43 GMT
#51
On July 12 2009 16:10 Mooga wrote:
Show nested quote +
On July 12 2009 15:20 Badjas wrote:
On July 12 2009 09:55 Mooga wrote:
On July 11 2009 11:34 benjammin wrote:
i'm not a computer science person in any way, but isn't this just laughably misguided? doesn't disclosure encourage the actual creation of fixes and distribution of them on a larger scale than otherwise? sure, it allows for malicious usage, but that would exist either way, and would be more effective if there was no disclosure

i don't know what that bit about money is all about, but this just seems immature

correct me if i am wrong, my degrees are in english :D


See, the thing is that hackers don't want full-disclosure because it threatens to fix exploits that hackers are using faster than no-disclosure. This forces hackers to come up with novel hacks, instead of using the same method indefinitely without being detected. Of course they say that what they are doing is to stop the script kiddies, but most script kiddies use grey-hat or black-hat exploits anyway, they don't go through code and write their own, so black-hat or grey-hat hackers are still relied on anyway to develop exploits.

So most hacks come from black hats, not from white hats? Where's your source?


It's a question of how the exploits are packaged and how they deliver the payload. I don't know how much you know about script kiddies, but most of them rely heavily on programs written by black-hatters/grey-hatters to deliver the payloads because they can't understand/write the code themselves.

That didn't answer the question. Wait perhaps I was a bit unclear.
So most exploit discoveries come from black hats, not from white hats? Where's your source?
I <3 the internet, I <3 you
StRyKeR
Profile Blog Joined January 2006
United States1739 Posts
July 12 2009 08:01 GMT
#52
interesting discussion

One of my classes at MIT we talked about the importance of sec. I can bring up some of the arguments used in the papers we've read. I get the impression that security systems experts in general agree that disclosure is the best policy.
Ars longa, vita brevis, principia aeturna.
fusionsdf
Profile Blog Joined June 2006
Canada15390 Posts
July 12 2009 08:17 GMT
#53
On July 11 2009 11:31 konadora wrote:
I think they're talking about how imageshack's security is bad, so they are proving that by hijacking the images...

ffs

I have to replace like 7 months of my blog's images


nope.

might want to check out http://it.slashdot.org/story/09/07/11/1430249/ImageShack-Hacked-Security-Groups-Threatened?art_pos=14
SKT_Best: "I actually chose Protoss because it was so hard for me to defeat Protoss as a Terran. When I first started Brood War, my main race was Terran."
Jusciax
Profile Joined August 2007
Lithuania588 Posts
July 12 2009 08:26 GMT
#54
On July 12 2009 15:15 Badjas wrote:
Sheesh whiners, the people behind this are vindicated exactly through the proof itself. To those who don't see what they're about, read the damn thing. To those who say they are aggravated by them making you lose an image, how else are they gonna give you a wake up call for their cause, a newspaper ad?

How is this going to help imageshack or any other site that could be exploited? If there is no full-disclosure and no security firms, where do these sites go to get latest possible vulnerabilities? If you want to destroy something - give a better alternative, instead of wrecking sites to make your point, like some tagger spraying messages on private property.
datscilly
Profile Blog Joined November 2007
United States529 Posts
July 12 2009 10:54 GMT
#55
It makes sense that people would be confused as to the reason they do this, because there's a whole story behind this, and it's not a simple story.
It began in the 70's when knowledge of phreaking-- phone hacking-- became widespread. The computerized phone system at the time used tones of specific frequencies to communicate with the phone network, and people found that they could "hack" the phone system by whistling at a certain note or using a device to do the same. Wiki: + Show Spoiler +
"In the United States, AT&T began introducing automatic switches for long distance in the mid-to-late 1950s. With the introduction of these switches, the general population began, for the first time, to interact with computing power on a large scale. Phreaking can be viewed as an extension of this, where individuals interested in computers and technology, yet unable to further that interest for a variety of reasons, turned to the only available option: the computer controlled telephone network." See wiki: Phreaking and wiki: 2600 hertz

With the seed introduced by phreaking, computer hacking took off in the 80's. + Show Spoiler +
In the 1980s, the revolution of the personal computer and the popularity of computer bulletin board systems (accessed via modem) created an influx of tech-savvy users. These BBSes became popular for computer hackers and others interested in the technology, and served as a medium for previously scattered independent phone phreaks to share their discoveries and experiments. This not only led to unprecedented collaboration between phone phreaks, but also spread the notion of phreaking to others who took it upon themselves to study, experiment with, or exploit the telephone system. During this time, phreaking lost its label for being the exploration of the telephone network, and began to focus more on toll fraud. Computer hackers began to use phreaking methods to find the telephone numbers for modems belonging to businesses, which they could later exploit. Groups then formed around the BBS hacker/phreaking (H/P) community such as the famous Masters of Deception (Phiber Optik) and Legion of Doom (Erik Bloodaxe) groups. In 1985 an underground e-zine called Phrack (a combination of the words Phreak and Hack) began circulation among BBSes, and focused on hacking, phreaking, and other related technological subjects.

"Hacking" as defined by the hacker subculture is different from the meaning assigned by the mass media and the mainstream public. To the subculture, a hacker is "A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary." It's about being fascinated with computers and wanting to know everything about them. It is being knowledgeable and an expert in a field, and when exploiting, the focus is on skill and expertise. This is often contrasted to "script kiddies", who breaking into computer systems just by downloading a script and running it.
Phrack is an online magazine dedicated to hacking, phreaking, and other related technological subjects. These days, the phrase "death of the hacker subculture" is frequently thrown around. What is the reason for this? The rise of the security industry: former hackers who have turned "white hat" and want to use their hacking knowledge to make a living. A case in point is the well-publicized hacker Kevin Mitnick, who was thrown in jail by the FBI after hacking into multiple companies' networks, and turned and started a security company when he got out of jail. If it is unclear, the security industry caters to corporations who want to protect their systems, and require knowledge of an expert in computer security. Why does the security industry mean the death of the hacker subculture? When every new exploit is publicized, almost all the 'holes' have been 'plugged' and there is nothing to play with. Only the most veteran of experts can now find new exploits, and they even have to work long and hard to find one.

+ Show Spoiler +
[image loading]


In the second paragraph you can see the grievances the hacker subculture have against the security industry. It's not just that the security industry is working against them, although that is the most basic reason, it is also that white hats have turned against their culture, a culture with a distaste for authority and a playful cleverness, who are all about taking the serious humorously and their humor seriously.
In the third paragraph they express their disgust at script kiddies who are viewed as unskilled and not 'in' their crowd.
The fifth paragraph is in reference to the people of the security industry who have chased money and made hacking into their job instead of a hobby.
Even though the hacker culture is not as active now as compared to the 90's, their are still people out there finding new tricks. This image is proof of that.
Badjas
Profile Blog Joined October 2008
Netherlands2038 Posts
July 12 2009 11:50 GMT
#56
On July 12 2009 17:26 Jusciax wrote:
Show nested quote +
On July 12 2009 15:15 Badjas wrote:
Sheesh whiners, the people behind this are vindicated exactly through the proof itself. To those who don't see what they're about, read the damn thing. To those who say they are aggravated by them making you lose an image, how else are they gonna give you a wake up call for their cause, a newspaper ad?

How is this going to help imageshack or any other site that could be exploited? If there is no full-disclosure and no security firms, where do these sites go to get latest possible vulnerabilities? If you want to destroy something - give a better alternative, instead of wrecking sites to make your point, like some tagger spraying messages on private property.

The report of a known exploit does not have to go along with the details of how to perform it. Furthermore, the owner of the software (or maintainers in the case of open source) is the only one who needs to know the details to fix the problem. When the problem is fixed, they can put out a public notice that clients should get a patch for that software.

The only thing that publication of the details of an exploit does, is to force the owner of the software to get a fix to limit the damage done by the exploit. Well, a second thing, it forces everyone to update said software who's using it because the risk of being hit by the exploit is higher. Exploits should be reported publicly though, so as to warn 'the world' of the danger.

There's the method that white hatters have of warning a software producer about an exploit with details, and threatening to publicize the exploit publicly within x days. This I see as a working method. If this method was applied for the exploit that got imageshack hit, then imageshack or a third party software producer made the error of not plugging the hole. If the exploit used in imageshack is an unpublished one, then the imageshack hacker is wrong. It would be very helpful for their cause if they mentioned the used exploit in the image.
I <3 the internet, I <3 you
Jusciax
Profile Joined August 2007
Lithuania588 Posts
July 12 2009 13:06 GMT
#57
On July 12 2009 19:54 datscilly wrote:
It makes sense that people would be confused as to the reason they do this, because there's a whole story behind this, and it's not a simple story.
It began in the 70's when knowledge of phreaking-- phone hacking-- became widespread. The computerized phone system at the time used tones of specific frequencies to communicate with the phone network, and people found that they could "hack" the phone system by whistling at a certain note or using a device to do the same. Wiki: + Show Spoiler +
"In the United States, AT&T began introducing automatic switches for long distance in the mid-to-late 1950s. With the introduction of these switches, the general population began, for the first time, to interact with computing power on a large scale. Phreaking can be viewed as an extension of this, where individuals interested in computers and technology, yet unable to further that interest for a variety of reasons, turned to the only available option: the computer controlled telephone network." See wiki: Phreaking and wiki: 2600 hertz

With the seed introduced by phreaking, computer hacking took off in the 80's. + Show Spoiler +
In the 1980s, the revolution of the personal computer and the popularity of computer bulletin board systems (accessed via modem) created an influx of tech-savvy users. These BBSes became popular for computer hackers and others interested in the technology, and served as a medium for previously scattered independent phone phreaks to share their discoveries and experiments. This not only led to unprecedented collaboration between phone phreaks, but also spread the notion of phreaking to others who took it upon themselves to study, experiment with, or exploit the telephone system. During this time, phreaking lost its label for being the exploration of the telephone network, and began to focus more on toll fraud. Computer hackers began to use phreaking methods to find the telephone numbers for modems belonging to businesses, which they could later exploit. Groups then formed around the BBS hacker/phreaking (H/P) community such as the famous Masters of Deception (Phiber Optik) and Legion of Doom (Erik Bloodaxe) groups. In 1985 an underground e-zine called Phrack (a combination of the words Phreak and Hack) began circulation among BBSes, and focused on hacking, phreaking, and other related technological subjects.

"Hacking" as defined by the hacker subculture is different from the meaning assigned by the mass media and the mainstream public. To the subculture, a hacker is "A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary." It's about being fascinated with computers and wanting to know everything about them. It is being knowledgeable and an expert in a field, and when exploiting, the focus is on skill and expertise. This is often contrasted to "script kiddies", who breaking into computer systems just by downloading a script and running it.
Phrack is an online magazine dedicated to hacking, phreaking, and other related technological subjects. These days, the phrase "death of the hacker subculture" is frequently thrown around. What is the reason for this? The rise of the security industry: former hackers who have turned "white hat" and want to use their hacking knowledge to make a living. A case in point is the well-publicized hacker Kevin Mitnick, who was thrown in jail by the FBI after hacking into multiple companies' networks, and turned and started a security company when he got out of jail. If it is unclear, the security industry caters to corporations who want to protect their systems, and require knowledge of an expert in computer security. Why does the security industry mean the death of the hacker subculture? When every new exploit is publicized, almost all the 'holes' have been 'plugged' and there is nothing to play with. Only the most veteran of experts can now find new exploits, and they even have to work long and hard to find one.

+ Show Spoiler +
[image loading]


In the second paragraph you can see the grievances the hacker subculture have against the security industry. It's not just that the security industry is working against them, although that is the most basic reason, it is also that white hats have turned against their culture, a culture with a distaste for authority and a playful cleverness, who are all about taking the serious humorously and their humor seriously.
In the third paragraph they express their disgust at script kiddies who are viewed as unskilled and not 'in' their crowd.
The fifth paragraph is in reference to the people of the security industry who have chased money and made hacking into their job instead of a hobby.
Even though the hacker culture is not as active now as compared to the 90's, their are still people out there finding new tricks. This image is proof of that.

Sounds quite simple. People with great skills who didn't manage grow up and adapt are being pissed at ones that could. Tho i don't see how this history justifies anything that they are doing, including hacking imageshack.
Jusciax
Profile Joined August 2007
Lithuania588 Posts
July 12 2009 13:23 GMT
#58
On July 12 2009 20:50 Badjas wrote:
The report of a known exploit does not have to go along with the details of how to perform it. Furthermore, the owner of the software (or maintainers in the case of open source) is the only one who needs to know the details to fix the problem. When the problem is fixed, they can put out a public notice that clients should get a patch for that software.

Could you give example of this, because i don't see how you could publicly report an exploit without giving away enough information for hacker figure it out. And if you publish it to small amount of maintainers, wouldn't leaked information be more dangerous, since most hackers would share it among themselves and only a handful of developers/maintainers would be able to fix it.

The only thing that publication of the details of an exploit does, is to force the owner of the software to get a fix to limit the damage done by the exploit. Well, a second thing, it forces everyone to update said software who's using it because the risk of being hit by the exploit is higher. Exploits should be reported publicly though, so as to warn 'the world' of the danger.

Why only "limit the damage done" if you can fix it? And I see only a positive thing out of 2nd statement. Again, i'm not expert, but just curious how can you report exploit publicly and give out enough details to help user and keep hacker in the dark?

There's the method that white hatters have of warning a software producer about an exploit with details, and threatening to publicize the exploit publicly within x days. This I see as a working method. If this method was applied for the exploit that got imageshack hit, then imageshack or a third party software producer made the error of not plugging the hole. If the exploit used in imageshack is an unpublished one, then the imageshack hacker is wrong. It would be very helpful for their cause if they mentioned the used exploit in the image.

This approach is far more logical than hacking the site to send a message.
Badjas
Profile Blog Joined October 2008
Netherlands2038 Posts
July 12 2009 14:17 GMT
#59
On July 12 2009 22:23 Jusciax wrote:
Show nested quote +
On July 12 2009 20:50 Badjas wrote:
The report of a known exploit does not have to go along with the details of how to perform it. Furthermore, the owner of the software (or maintainers in the case of open source) is the only one who needs to know the details to fix the problem. When the problem is fixed, they can put out a public notice that clients should get a patch for that software.

Could you give example of this, because i don't see how you could publicly report an exploit without giving away enough information for hacker figure it out. And if you publish it to small amount of maintainers, wouldn't leaked information be more dangerous, since most hackers would share it among themselves and only a handful of developers/maintainers would be able to fix it.

How do hackers share? Can't security researchers get the news on exploits if hackers can share?
Secondly, if I find an exploit in a mail server, I could simply say that 'mail server x has an exploit regarding message parsing as of 12-7-2009 leading to program crashes'. the amount of detail that is safe to give really varies.

Show nested quote +
The only thing that publication of the details of an exploit does, is to force the owner of the software to get a fix to limit the damage done by the exploit. Well, a second thing, it forces everyone to update said software who's using it because the risk of being hit by the exploit is higher. Exploits should be reported publicly though, so as to warn 'the world' of the danger.

Why only "limit the damage done" if you can fix it? And I see only a positive thing out of 2nd statement. Again, i'm not expert, but just curious how can you report exploit publicly and give out enough details to help user and keep hacker in the dark?

yeah I kinda left the message too implicit. limit damage done should be read 'as opposed to preventing any damage from occurring'.

Show nested quote +
There's the method that white hatters have of warning a software producer about an exploit with details, and threatening to publicize the exploit publicly within x days. This I see as a working method. If this method was applied for the exploit that got imageshack hit, then imageshack or a third party software producer made the error of not plugging the hole. If the exploit used in imageshack is an unpublished one, then the imageshack hacker is wrong. It would be very helpful for their cause if they mentioned the used exploit in the image.

This approach is far more logical than hacking the site to send a message.

Euh, false dichotomy?
I <3 the internet, I <3 you
ThaddeusK
Profile Joined July 2008
United States233 Posts
July 12 2009 14:34 GMT
#60
On July 12 2009 22:06 Jusciax wrote:
Sounds quite simple. People with great skills who didn't manage grow up and adapt are being pissed at ones that could. Tho i don't see how this history justifies anything that they are doing, including hacking imageshack.


not really, its just that they view hacking as something that should be done for fun/as a hobby rather than as a job, saying that they didnt manage to grow up and adapt is like saying the people who play starcraft but are not progamers didnt grow up and adapt (my point being that doing something for a job doesnt have to be the end result of having a hobby, sometimes you just do it for fun) although you are right, it doesnt justify what they are doing.
Shizuru~
Profile Blog Joined April 2009
Malaysia1676 Posts
July 12 2009 14:52 GMT
#61
What's full disclosure and wth is this sec about?
Telemako
Profile Blog Joined September 2002
Spain1636 Posts
July 12 2009 15:14 GMT
#62
In computer security, full disclosure means to disclose all the details of a security problem which are known. It is a philosophy of security management completely opposed to the idea of security through obscurity. The concept of full disclosure is controversial, but not new; it has been an issue for locksmiths since the 19th century.

Full disclosure requires that full details of a security vulnerability are disclosed to the public, including details of the vulnerability and how to detect and exploit it. The theory behind full disclosure is that releasing vulnerability information immediately results in quicker fixes and better security. Fixes are produced faster because vendors and authors are forced to respond in order to save face. Security is improved because the window of exposure, the amount of time the vulnerability is open to attack, is reduced.

by Wikipedia
I've been around since it all started, and it feels good
Jusciax
Profile Joined August 2007
Lithuania588 Posts
July 12 2009 16:08 GMT
#63
On July 12 2009 23:34 ThaddeusK wrote:
Show nested quote +
On July 12 2009 22:06 Jusciax wrote:
Sounds quite simple. People with great skills who didn't manage grow up and adapt are being pissed at ones that could. Tho i don't see how this history justifies anything that they are doing, including hacking imageshack.


not really, its just that they view hacking as something that should be done for fun/as a hobby rather than as a job, saying that they didnt manage to grow up and adapt is like saying the people who play starcraft but are not progamers didnt grow up and adapt (my point being that doing something for a job doesnt have to be the end result of having a hobby, sometimes you just do it for fun) although you are right, it doesnt justify what they are doing.

But you aren't pissed at others who took starcraft gaming to pro level and make a living out of it, are you? That was my whole point (or at least that's what i got from that post) that hackers think others who took it to next level (used their knowledge to get a job in security firms) are somehow sellouts and not respected anymore. Which is why i found that view childish and laughable.
stafu
Profile Blog Joined January 2009
Australia1196 Posts
July 12 2009 16:08 GMT
#64
www.imgur.com ftw : )
Asta
Profile Joined October 2002
Germany3491 Posts
July 12 2009 16:27 GMT
#65
So sad how many ppl in this thread got all angry and bashed this movement without even reading the statement because it's more than 2 lines.
If you'd have read it, you might have
a) learned something interesting/important, even if you decided they were wrong and
b) discovered that "no images were harmed", so you wouldn't have had to reupload your images or anything.
Mooga
Profile Blog Joined June 2007
United States575 Posts
July 12 2009 16:52 GMT
#66
On July 12 2009 16:43 Badjas wrote:
Show nested quote +
On July 12 2009 16:10 Mooga wrote:
On July 12 2009 15:20 Badjas wrote:
On July 12 2009 09:55 Mooga wrote:
On July 11 2009 11:34 benjammin wrote:
i'm not a computer science person in any way, but isn't this just laughably misguided? doesn't disclosure encourage the actual creation of fixes and distribution of them on a larger scale than otherwise? sure, it allows for malicious usage, but that would exist either way, and would be more effective if there was no disclosure

i don't know what that bit about money is all about, but this just seems immature

correct me if i am wrong, my degrees are in english :D


See, the thing is that hackers don't want full-disclosure because it threatens to fix exploits that hackers are using faster than no-disclosure. This forces hackers to come up with novel hacks, instead of using the same method indefinitely without being detected. Of course they say that what they are doing is to stop the script kiddies, but most script kiddies use grey-hat or black-hat exploits anyway, they don't go through code and write their own, so black-hat or grey-hat hackers are still relied on anyway to develop exploits.

So most hacks come from black hats, not from white hats? Where's your source?


It's a question of how the exploits are packaged and how they deliver the payload. I don't know how much you know about script kiddies, but most of them rely heavily on programs written by black-hatters/grey-hatters to deliver the payloads because they can't understand/write the code themselves.

That didn't answer the question. Wait perhaps I was a bit unclear.
So most exploit discoveries come from black hats, not from white hats? Where's your source?


I was probably unclear - all I was trying to say is that whomever discovered the exploit is irrelevant to the question of which scripts script kiddies use. If you want to let script kiddies hack security systems, then you have to basically write every line of code for them in order to make that possible because that's all script kiddies do... they download programs from hackers and run those scripts on everything. White-hat hackers do not explicitly make programs to help script kiddies execute exploits. So that's what I meant by needing black-hats or grey-hats to exploit.
Normal
Please log in or register to reply.
Live Events Refresh
Sparkling Tuna Cup
10:00
Weekly #126
Classic vs ByuNLIVE!
herO vs TBD
CranKy Ducklings231
TKL 188
IndyStarCraft 176
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
Lowko384
TKL 188
IndyStarCraft 176
SortOf 131
ProTech114
StarCraft: Brood War
Sea 12773
Calm 6699
Horang2 3748
Bisu 2040
Jaedong 1368
EffOrt 585
Aegong 525
Shuttle 525
Killer 411
Stork 406
[ Show more ]
Hyuk 296
Larva 279
Mini 253
Soma 216
Light 207
actioN 160
Snow 160
ggaemo 156
ZerO 134
Soulkey 131
hero 90
Rush 79
Hm[arnc] 47
Sharp 47
JYJ 45
sSak 42
Mind 41
sorry 37
Backho 37
HiyA 36
Shinee 35
[sc1f]eonzerg 29
Free 28
soO 24
Movie 21
Terrorterran 20
zelot 19
ajuk12(nOOB) 17
Sacsri 16
Noble 16
GoRush 12
Icarus 6
Dota 2
qojqva740
Gorgc534
Counter-Strike
olofmeister4867
fl0m2422
Other Games
singsing1948
Liquid`RaSZi914
B2W.Neo563
XcaliburYe324
hiko249
crisheroes213
XaKoH 144
RotterdaM140
Mew2King80
QueenE61
ArmadaUGS29
ZerO(Twitch)12
Organizations
Counter-Strike
PGL11330
StarCraft: Brood War
UltimateBattle 901
Other Games
BasetradeTV705
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 14 non-featured ]
StarCraft 2
• HappyZerGling 93
• CranKy Ducklings SOOP4
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• iopq 2
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• WagamamaTV149
Upcoming Events
PiGosaur Cup
11h 21m
Replay Cast
20h 21m
Kung Fu Cup
23h 21m
Replay Cast
1d 11h
The PondCast
1d 21h
CranKy Ducklings
2 days
WardiTV Team League
2 days
Replay Cast
3 days
CranKy Ducklings
3 days
WardiTV Team League
3 days
[ Show More ]
uThermal 2v2 Circuit
4 days
BSL
4 days
Sparkling Tuna Cup
4 days
WardiTV Team League
4 days
BSL
5 days
Replay Cast
5 days
Replay Cast
5 days
Wardi Open
5 days
Liquipedia Results

Completed

CSL Elite League 2026
RSL Revival: Season 4
NationLESS Cup

Ongoing

BSL Season 22
ASL Season 21
CSL 2026 SPRING (S20)
StarCraft2 Community Team League 2026 Spring
Nations Cup 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026

Upcoming

Escore Tournament S2: W2
IPSL Spring 2026
Escore Tournament S2: W3
Acropolis #4
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
uThermal 2v2 Last Chance Qualifiers 2026
RSL Revival: Season 5
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
Asian Champions League 2026
IEM Atlanta 2026
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
IEM Rio 2026
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.