this post was submitted on 22 Aug 2024
278 points (97.0% liked)

Technology

59589 readers
2838 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 15 comments
sorted by: hot top controversial new old
[–] witheyeandclaw@lemmy.sdf.org 36 points 3 months ago (1 children)

They should instead be hired for penetration testing and then have the ability to pay their child support.

[–] aisteru@lemmy.aisteru.ch 7 points 3 months ago

"Test conclusion: I now have a child"

[–] Churbleyimyam@lemm.ee 19 points 3 months ago (2 children)

Interested to hear if anyone knows how he was caught.

[–] SnotFlickerman@lemmy.blahaj.zone 36 points 3 months ago* (last edited 3 months ago)

I would guess the number one way he was found was internal security systems in each of the hacked systems.

Cybersecurity involves lots of automated systems that "alert" system admins when it comes to strange patterns.

Like... This user is logging in from an unrecognized IP from an unrecognized geo-location during a time the user usually would be asleep. The user in question has never logged into the system from that area or IP, nor do they do it when they're off the clock in the middle of the night. These unusual details would trigger an alert sent to a sysadmins cell phone, and from them they would begin digital forensics to try to pick up the trail of who this was.

[–] Ste41th@lemmy.ml 12 points 3 months ago (1 children)

Bet ya asking for a friend arn’t ya

[–] Churbleyimyam@lemm.ee 5 points 3 months ago

My friend says "maybe".

[–] biggerbogboy@sh.itjust.works 15 points 3 months ago

Not excusing his actions but, as an Australian, I find child support a predatory system, the fact it basically cyphons people's finances, hurts their potential for growth and rehab, and the fact that I've heard so many stories of the parent never using the funds on their kids, but on their own greed and self fulfilment, which is just horrific, although I don't believe I know enough about this topic to have a truly well thought out opinion.

[–] yesman@lemmy.world 3 points 3 months ago (1 children)

"Identity theft" is bullshit. They didn't steal an identity, they stole credentials. But even though those credentials were created and maintained outside of our consent, control, and often contrary to our interests, somehow we're responsible when they get stolen.

[–] SnotFlickerman@lemmy.blahaj.zone 52 points 3 months ago (1 children)

He then "assigned himself as the medical certifier for the case and certified his death, using the digital signature of the doctor," the press release said.

I get what you're saying, but I'm pretty sure credentials for medical certification are pretty damn important and not contrary to anyone's interest. It's literally to ensure a professional, who has the correct Authentication, Authorization, and Accounting, is actually altering State databases about citizens' deaths, and not just some rando like this asshole.

I would say a digital signature constitutes a type of forgery, and thus would fall under actual identity theft.

[–] KingThrillgore@lemmy.ml 1 points 3 months ago

When the system is done with him he's gonna think back to "Well, should I kill myself as opposed to faking it?" and wish he chose differently.