What's new
Fantasy Football - Footballguys Forums

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Hypothetical scenario - please give hypothetical advice (1 Viewer)

Send them to me, I can usually do some sleuthing and find the hacker that way.

And by sleuthing I mean pleasuring myself.

 
"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."

:mellow:
What kind of perv are we talking about here?

Are talking two naked women with a funnel and a fish?

two naked women using a funnel and fish to commit an unnatural sex act.”Read more at http://blacksportsonline.com/home/2011/01/afl-coach-tim-marcum-racist-obama-emails-weird-porn-revealed-in-lawsuit/#chZWxMKBeOpgt25x.99
“a video of two naked women using a funnel and fish to commit an unnatural sex act.”Read more at http://blacksportsonline.com/home/2011/01/afl-coach-tim-marcum-racist-obama-emails-weird-porn-revealed-in-lawsuit/#chZWxMKBeOpgt25x.99
I don't have any idea what they were doing, but as horrified as he was, I'm guessing it must involve something weird.

 
"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."

:mellow:
:shrug: he met the requirements. Welcome to the 9th floor.
Right. He's trying to become a lawyer not a judge or politician. Sure he may have those goals longterm, but what are the odds random hacker kid is going to still have copies of those pics thirty years from now? ETA: Besides, thirty years from now all of his peers will probably be like "who didn't have naked pics on their phone?"Schlzm
Either way, having someone else steal pictures of you committing unnatural acts with your girlfriend isn't going to keep you from becoming a judge. And it sure as hell isn't going to keep you from being a plaintiff's attorney.
now we need details.

 
"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."

:mellow:
:shrug: he met the requirements. Welcome to the 9th floor.
Right. He's trying to become a lawyer not a judge or politician. Sure he may have those goals longterm, but what are the odds random hacker kid is going to still have copies of those pics thirty years from now? ETA: Besides, thirty years from now all of his peers will probably be like "who didn't have naked pics on their phone?"Schlzm
Either way, having someone else steal pictures of you committing unnatural acts with your girlfriend isn't going to keep you from becoming a judge. And it sure as hell isn't going to keep you from being a plaintiff's attorney.
now we need details.
I have none. Again, I just assume.

 
"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."

:mellow:
:shrug: he met the requirements. Welcome to the 9th floor.
Right. He's trying to become a lawyer not a judge or politician. Sure he may have those goals longterm, but what are the odds random hacker kid is going to still have copies of those pics thirty years from now? ETA: Besides, thirty years from now all of his peers will probably be like "who didn't have naked pics on their phone?"Schlzm
Either way, having someone else steal pictures of you committing unnatural acts with your girlfriend isn't going to keep you from becoming a judge. And it sure as hell isn't going to keep you from being a plaintiff's attorney.
Exactly. Go with the wang pic idea. Tell him to post this kids email in every public location he can. Send him a different weang pic every day, like a wang of the month club. Schlzm

 
"I don't want there to be a big scandal that makes it seem like I'm some kind of pervert while I'm trying to become a lawyer."

:mellow:
:shrug: he met the requirements. Welcome to the 9th floor.
Right. He's trying to become a lawyer not a judge or politician. Sure he may have those goals longterm, but what are the odds random hacker kid is going to still have copies of those pics thirty years from now? ETA: Besides, thirty years from now all of his peers will probably be like "who didn't have naked pics on their phone?"Schlzm
Either way, having someone else steal pictures of you committing unnatural acts with your girlfriend isn't going to keep you from becoming a judge. And it sure as hell isn't going to keep you from being a plaintiff's attorney.
Exactly. Go with the wang pic idea. Tell him to post this kids email in every public location he can. Send him a different weang pic every day, like a wang of the month club.Schlzm
It's the gift that keeps on giving, Clark

 
Have him do nothing, except delete emails if they come. The picture thief needs to communicate to extort anything, so don't provide an opportunity. If there are no fish in the pond, people generally give up fishing.

 
Have him do nothing, except delete emails if they come. The picture thief needs to communicate to extort anything, so don't provide an opportunity. If there are no fish in the pond, people generally give up fishing.
I'm not going to tell him to delete emails admitting to crimes. That would be not very smart.

 
Okay, I guess I can trust you guys. This conversation really just happened. In my office. With a very frightened looking law clerk.
Pffft. I hear that there are law clerks who put ridiculously embarrassing stuff and pictures of themselves and their girlfriends on the internet while in law school who turn out just fine. Kid will be fine.

:coffee:

 
Last edited by a moderator:
just call the cops brohan and then go and let them just squash that guy they will set it up and bam next thing you know some john law is kneeling on this jbags neck and he is crying and double bam bad boys bad boys start playing and you know they are beating that guy senseless the minute the credits roll take that to the bank brohans but in all honesty just swallow your pride and call the cops and let them get this jboy

 
just call the cops brohan and then go and let them just squash that guy they will set it up and bam next thing you know some john law is kneeling on this jbags neck and he is crying and double bam bad boys bad boys start playing and you know they are beating that guy senseless the minute the credits roll take that to the bank brohans but in all honesty just swallow your pride and call the cops and let them get this jboy
Lock it up

 
I would just ignore it. It's a scam and if it is actually real he needs to play it up to the partners.... what you don't do that to your wife with a turkey baster?

 
Oh and I would not let him live this down for basically ever. He needs a nickname now to remind him of this incident.

 
I just sent out 2000 emails saying I hacked people's phones and will provide the information to their s/o if they don't send me $2000. Hypothetically, how many will bite?

 
Yankee23Fan said:
Oh and I would not let him live this down for basically ever. He needs a nickname now to remind him of this incident.
I did refer to him as Senor Danger when he left for the day.

 
I just sent out 2000 emails saying I hacked people's phones and will provide the information to their s/o if they don't send me $2000. Hypothetically, how many will bite?
I think you shot too high on the payoff. Would you rather have 5 people send you $2000, or 100 people send you $100?

 
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.

 
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?

 
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.Schlzm

 
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.Schlzm
That makes sense. I think I'm just used to my phone always being on a wifi network.

 
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.Schlzm
If we can go back to hypotheticals, it's fairly possible that anyone this hypothetically happened to might have had his phone syncing with a hypothetical cloud service.

 
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.Schlzm
That makes sense. I think I'm just used to my phone always being on a wifi network.
Another item that is being "field tested" are malicious platform independant advertisement based droppers. We've seen plenty of this activity on standard computer systems but due to the standardization of phone operating systems code is being tweaked to include mobile platforms as well, so surfing to a site that has one of these ads in its rotation could result in a compromise. Schlzm

 
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.Schlzm
If we can go back to hypotheticals, it's fairly possible that anyone this hypothetically happened to might have had his phone syncing with a hypothetical cloud service.
Password rest to something stronger and lesson learned. Or you know, don't just blast every intimate part of your life out to the ether.Schlzm

 
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.Schlzm
If we can go back to hypotheticals, it's fairly possible that anyone this hypothetically happened to might have had his phone syncing with a hypothetical cloud service.
Password rest to something stronger and lesson learned. Or you know, don't just blast every intimate part of your life out to the ether.Schlzm
Indeed.

 
listen i saw on alaska troopers that these cops would sit up on a bluff with some binoculars and then bust guys for fishing wrong and hells bells if there are guys that will bust you for fishing wrong i mean holy cow its like hey you are using a rapala when you can only use live bait i know you are thinking did i fire five shots or six well in all the excitement i sort of lost track myself so are you feeling lucky punk you just know that they are going to go all wyatt erp on some sucker commiting blackmail so my suggestion is to call the alaska state troopers and get them on the job take that to the bank brohans

 
listen i saw on alaska troopers that these cops would sit up on a bluff with some binoculars and then bust guys for fishing wrong and hells bells if there are guys that will bust you for fishing wrong i mean holy cow its like hey you are using a rapala when you can only use live bait i know you are thinking did i fire five shots or six well in all the excitement i sort of lost track myself so are you feeling lucky punk you just know that they are going to go all wyatt erp on some sucker commiting blackmail so my suggestion is to call the alaska state troopers and get them on the job take that to the bank brohans
That's what I was going to say.

 
hey brohan those guys cover the whole matsu valley by themselfs and eveyrone up there has a gun you think they are going to be afraid of some little puke trying to blackmail a brohan heck no they are probably going to find that guy surround his house and then take him out of there in cuffs and probably on a snowmobile take that to the bank brohans

 
Someone (let's call him Jim) comes to you and says he got a disturbing email. The email said something to the effect of "Hey, Jim, you don't know me, but I pulled all the private photos and video off of your iphone remotely while learning how to hack apple systems, and I think I may send them to your girlfriend."

Jim asks you for advice. He tells you that the photos/video in question are "sensitive" and "embarrassing" but not illegal. What's your suggestion?
1. I think it's a scam and no one has any pictures.

2. Post the full message source from the email and let some of the experts see where it came from and whether it looks legit or not. I'm betting "not".

 
TheIronSheik said:
Schlzm said:
TheIronSheik said:
Zow said:
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.Schlzm
That makes sense. I think I'm just used to my phone always being on a wifi network.
Makes sense to me too. And I did inquire about this to and got the impression it was still more difficult. :shrug:

 
Henry Ford said:
Schlzm said:
TheIronSheik said:
Zow said:
Some serious insight:

A couple months ago I got to interview our county's lead detective on electronic crimes and a PI who specializes in cellular data extraction and wiretapping. Per both of them they said it is incredibly difficult and takes ridiculous equipment and skill to be able to remotely hack a cell phone. Granted, they did say on the scale of difficulty the iPhone was on the easier end, but still said it takes some serious ability to hack without ever being able to physically handle the phone.
I don't doubt you, but how is it any different than hacking a laptop?
Varies. If the phone is connecting to WiFi it really isn't all that different. If the phone stays on carrier then you need the target to download, install and run a malicious app. If the user decides to sync all of the crap on their phone with a cloud service then it comes down to the services security and how strong of a password they used.Schlzm
If we can go back to hypotheticals, it's fairly possible that anyone this hypothetically happened to might have had his phone syncing with a hypothetical cloud service.
Please tell me he has it synced with the Firm's cloud service...

 

Users who are viewing this thread

Back
Top