7156
DOWN WITH THE ESTABLISHMENT (media.patriots.win) 🌶️🌶️ SPICY🌶️🌶️
posted ago by Oberfunkelnfurher72 ago by Oberfunkelnfurher72 +7159 / -3
Comments (460)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
157
TrumperfromNYC 157 points ago +159 / -2

God I really hope they got outta there with the hard drives

68
djgLXXII 68 points ago +71 / -3

They would be encrypted! Well, maybe. Who knows.

71
AngeredKabar 71 points ago +73 / -2

I hope that dumb cunt is as dumb as I think and left the flash drive with the encryption key in the computer and sticky notes with her passwords on her monitor.

Remember how Hunter's laptop password was hunter2?

Unless that was the joke.

35
DickweedDewine 35 points ago +35 / -0

Hunter2 as a password has been a meme for years.. lol

12
AngeredKabar 12 points ago +12 / -0

I know.

But I wouldn't put it past that crackhead.

2
pimpdaddypayne 2 points ago +2 / -0

All I see is *******

14
DiscoverAFire 14 points ago +14 / -0

95% of people really are that dumb.

6
Dedcatsk8r 6 points ago +6 / -0

Yep. If you get above 115 youre in a small group. Like less than %7. Get above 132 and youre in a%2 population. Id say that many on here are at or above %2 population range too. The rest need to fake it till they make it! Im 143 but it never did me any good,too defiant to comply. Id rather eat dirt than a dick!

7
marishiten 7 points ago +7 / -0

He email was open and she did have sticky notes/stickers on her machine/monitor. So it's a safe ass bet the encryption USB and password to log in are there.

The biggest concern is if those PC's are thin clients.

4
illiteregetimate 4 points ago +4 / -0

What was Podesta’s? Something equally as stupid.

4
NC_patriot 4 points ago +4 / -0
1
modscalledmeacuck 1 point ago +2 / -1

can u guess wht ianwatkins password was?

VERACRYPT ALL DA THINGZ

18
deleted 18 points ago +18 / -0
7
lordvon 7 points ago +7 / -0

emails maybe

3
marikiri 3 points ago +4 / -1

because emails have gotten us big wins in the past, right?

8
AllAmericanAdonis 8 points ago +8 / -0

They HAVE TO BE ALL encrypted with Microsoft Bitlocker. Have to be Seriously, if not, their IT people are fucked up.

16
OldGloryUnfurled 16 points ago +16 / -0

More than likely they use those machines as a 'PAW' (Privileged Access Workstation) to get into the actual system. In other words, a dumb terminal.

I bet her passwords were stickied to the underside of her keyboard though.

3
AllAmericanAdonis 3 points ago +3 / -0

PAW is a blueprint to prevent active directory domain compromise by mimikatz. A local admin or cached credential would work as well but I am 100% sure the system is Bitlocker protected.

4
Aoikaze2000 4 points ago +4 / -0

Those hard drives are useless without the keys to unlock them.... unless we happen to get someone from Microsoft here willing to use the Bitlocker source code to create a hack for us... and even then that assumes that the encryption isn't one of those RSA algorithms that's basically a one way hash....

1
deleted 1 point ago +1 / -0
2
TheNewRepublic 2 points ago +2 / -0

They didn’t log off someone should have just uploaded everything to the cloud

1
deleted 1 point ago +1 / -0
19
I_Love_45-70_Gov 19 points ago +19 / -0

Password: Seagram's7

4
deleted 4 points ago +4 / -0
-3
deleted -3 points ago +3 / -6
6
deleted 6 points ago +6 / -0
3
WildSauce 3 points ago +3 / -0

Hillary gave gin a bad name, which is a shame because gin is fantastic.

16
CantStumpTheTrump 16 points ago +18 / -2

They lost any chance of getting any of her data when they shut the computer down. Its now just encrypted junk on a dive and only worth keeping in a measum in hopes that one day computer allows it to be decrypted in a couple months instead of a couple million years.

10
SilverStarv5 10 points ago +10 / -0

Are you sure about this?

5
Libertas_Vel_Mors 5 points ago +6 / -1

NIST STIG * configuration requirements practically demand it.

Pretty sure that unless they changed the passwords before killing the machine, they're well and truly fucked.

They might luck out and the IT guy only relied on Bitlocker (which isn't that hard to bypass), but I wouldn;t bet too much on that.

  • Yes, STIG is typically DoD, but IIRC it's still the hallmark for how all sensitive government computers/servers/etc are to be configured and maintained.
2
LibertarianXian 2 points ago +2 / -0

Yea it's DISA STIG but this is still pretty much right.

Oh and they probably use some kind of VDI (Virtual Desktop Infrastructure) that requires minimum client hardware - basically just a monitor and a box for peripheral plugs and USB media. The actual guts is floating on a hard drive array somewhere in a secure fed datacenter.

2
soldierofcovfefe 2 points ago +2 / -0

a lot of valuable information might be held in volatile memory, which would most likely be lost on any shutdown, but there is still a lot of places information could be salvaged off hidden hard drive sectors, memory swap, page files, etc. so not a totally lost cause

2
modscalledmeacuck 2 points ago +3 / -1

nah, u wont find anything on there, stonetear already bleachbit it