Why is it, when you tell someone you do not want to talk with them, they often keep trying to talk to you, as if they either have not heard you, or do not care.
I caught wind of this on MotherJones.com, I suggest everyone with more than 2 brain cells read and watch it.
http://www.motherjones.com/politics/2012/09/secret-video-romney-private-fundraiser
In short it’s secret videos from a Romney fundraiser where he lays out what he REALLY thinks about things. You know, those little bits he doesn’t dare say on the campaign trail.
Sarah and I were thrilled to see them, we spent Sunday wandering Seattle and getting very sore in the process. (Damned those hills)
A fun time was had by all.
The details are posted here. In short:
“During the second week of March 2012, a Dell Vostro notebook, used by
Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action
Team and New York FBI Office Evidence Response Team was breached using the
AtomicReferenceArray vulnerability on Java, during the shell session some files
were downloaded from his Desktop folder one of them with the name of
“NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS
devices including Unique Device Identifiers (UDID), user names, name of device,
type of device, Apple Push Notification Service tokens, zipcodes, cellphone
numbers, addresses, etc. the personal details fields referring to people
appears many times empty leaving the whole list incompleted on many parts. no
other file on the same folder makes mention about this list or its purpose. ”“the original file contained around 12,000,000 devices. we decided a million would be
enough to release. we trimmed out other personal data as, full names, cell numbers, addresses,
zipcodes, etc. not all devices have the same amount of personal data linked. some devices
contained lot of info. others no more than zipcodes or almost anything. we left those main columns we
consider enough to help a significant amount of users to look if their devices
are listed there or not. the DevTokens are included for those mobile hackers
who could figure out some use from the dataset.”
You can see the full decrypted and decompressed list here, look for your device. If you find it, perhaps you should ask Apple why it’s on this list.
Update: A company by the name of “Bluetoad” said it found a 98% correlation between the list and their database of UDIDs. Supposedly it’s not shocking they would have this information, personally I think it is rather shocking.
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 | 29 |
30 |
36 queries. 0.056 seconds