Site under Cyber attack. [Mod -- seems back up again]

The campaign's store is still not back up for me... I'm still waiting so I can buy my shirt and other materials. :(
 
9aecf78d.jpg
 
If this doesn't make media headlines, I will scream. Anyone with me on that?

I think the campaign may have been with you when they decided to stage this 'cyber attack' as a sweet little PR stunt :) .. It serves dual purposes.

1) generate media

2) ignite the grassroots to donate tomorrow as well.

just speculating, of course! :cool:
 
Last edited:
I think the campaign may have been with you when they decided to stage this 'cyber attack' as a sweet little PR stunt :) .. It serves dual purposes.

1) generate media

2) ignite the grassroots to donate tomorrow as well.

just speculating, of course! :cool:

Stop being stupid.....ok thanks
 
You'd think by now that the people that try to bring us down would realize that their shenanigans only make us work harder. Because of this RP will get an extra $10 from me tomorrow.
 
Last edited:
TBH.... I'm getting increasingly wary of online money bombs. I love the success RP had today, though, no doubt, and a great deal of his campaigns' financial success can be tied to moneybombs. But... our personal information is probably already widely distributed (privately, if not publicly), no matter how safe we think we are being. Google your email address and see if you can't find yourself on a dumped list. These online dumps serve to warn you your information has already been compromised.

Moneybombs take tens (hundreds?) of thousands of unique credit card numbers and extraordinarily high amounts of personal information all in one day. That's extremely serious business, and would be a huge lure for serious hackers -- the slimy cracking kind, and not the 18-25 y/o's in the news because they've been detected. A site falls to DDoS. Do I trust they'll be able to secure the most data I've ever given in a single transaction? I hope RP's campaign IT staff are the most competent and dedicated workers he has. He created the online moneybomb, and they aren't going away from politics, especially not our own where we've seen their power at work.

I think RevolutionPAC is having a moneybomb on Sep. 19th. I very much hope their IT staff is competent and dedicated. For smaller campaigns, it should probably be seriously considered to only handle offline payments. 16-year-olds are being arrested for causing serious disruptions in Paypal's service. Those are the ones being detected and caught. How many go undetected? How many experienced hackers/crackers are after our information? How many realize the treasure trove of information which could be found during moneybombs while the candidates are relaxed, watching thousands or millions of dollars rolling into their campaign funds?

At any rate, we all need to take online security seriously. Use many different complicated passwords (consider a service like LastPass. Not perfect, but your passwords will at least be encrypted). Use different usernames. Consider plastic companies which provide a service giving "fake" virtual credit card numbers. Never give information which could harm you over unsecured (that is, connections which aren't encrypted) or otherwise vulnerable websites. I'm not paranoid, but I've personally and recently experienced a major breach of my personal information. By using basic security methods (different passwords and usernames, in this case), most of my accounts are at no greater threat than prior to having my information distributed. Don't ever assume your accounts won't be cracked.

Edit: FWIW, I've been assured Ron's (and Rand's, for that matter) server infrastructure is sound and handled by extremely competent professionals who've worked with large corporations' infrastructure. If you search enough, you can find out for yourself which company designed and maintains the Pauls' campaign servers, but they have a very impressive resume. However, my concerns over RevolutionPAC's moneybomb and other smaller campaigns continuing on with online moneybombs remain unaddressed.
 
Last edited:
The campaign's store is still not back up for me... I'm still waiting so I can buy my shirt and other materials. :(

I finally was able to access the page. Got my donation off about 5 minutes before midnight here in Texas. :)


Donation amount: $51.75
Transaction date/time: 2011-08-20 23:56:32
Transaction ID: 9S740849HP5589522

Thank you,
Ron Paul 2012 PCC
 
Do you honestly thing RP would allow a publicity stunt, of the kind people are suggesting, in his name? I think he's much more honest than that.
 
The problem with screaming "denial of service attack" is that it is pretty indistinguishable from lots of people going to the site at the same time for legitimate reasons. Maybe they just need to upgrade the site.
 
The problem with screaming "denial of service attack" is that it is pretty indistinguishable from lots of people going to the site at the same time for legitimate reasons. Maybe they just need to upgrade the site.

No it is not, there's a characteristic signature / pattern to the type of traffic generated, hence the DOS classification in the first place.

All respect, your assertion makes it appear you are not as aware of the topic you are speaking about as you are projecting with that statement.

Sorry if that sounds harsh as I have no wish to 'fight' with a fellow RP'r , but the reality is that very rudimentary packet inspection of the traffic flowing to a webserver/cluster by a moderately experienced network technician can easily separate the chaff from the wheat so to speak in terms of identifying it at least...filtering it out is it's own technical problem and volumes have been written about it, but I'll leave that to Google if you are interested in researching the subject deeper.

Now what I can agree with you on, is to say Let's hope the Paul campaign people are not being 'loose' with the term DoS and that their provider's techs did the necessary technical analysis to substantiate their saying it publicly.


Anyways, go Ron Paul!
 
I think the campaign may have been with you when they decided to stage this 'cyber attack' as a sweet little PR stunt :) .. It serves dual purposes.

1) generate media

2) ignite the grassroots to donate tomorrow as well.

just speculating, of course! :cool:
WHY would the campaign risk taking down their site and not making their goal?!

Why would the campaign risk being caught in some sort of false-flag PR stunt?!

Is that how Ron Paul operates? Do you think Ron or the people that he has hired to work for him would do something like that? Do you think Ron's personal integrity would allow him or his staff to do something like that? The answer is of course "NO".


Just as the campaign was getting close to reaching their goal the site was attacked by someone, but not sure who. It's just that simple. To ensure that people who wanted to donate were able to, they have extended the Money Bomb just a bit longer.

Not everything is a conspiracy, I promise ;):p
 
Back
Top