Newly Identified Defendants

The arena of International Law, Digital crime and Money creates an absolute boiling pot of complex, interconnected issues that can sometimes be difficult to understand. The case of Microsoft Corporation, Plaintiff verses Defendants in a Civil Action No. 1-24-cv-2323 in Virginia USA where the plaintiff disabled the abuse of their system and then took legal action is bedtime story reading.

The defendants were truly global and included end-users of a hacked system. Defendants were named and shamed but apparently the legal counsel of the plaintiff had personal information leaked publicly (Doxing). 

So much for privacy.

No one in the case is off-limits and brings a point that privacy is a gargantuan task nowadays where even high-level operatives are vulnerable to attack and exploitation.

Every run Data classification for our personal stuff?

The Post Office Protocol

I have detected a distinct reluctance and avoidance to blog anything for months now.

An unrealistic fear that it will make a difference.

This is my jotting space for general nonsense but somehow, I have inherited the view, like so many walking the social media corridors, that it’s better to view than like.

Turned off my LinkedIn visibility for now so stop looking. Turned off spell check, Turned off Ai, Turned off GPS, human intelligence now available.

Post Office Protocol email (now obsolete) apart from being vulnerable forced the user into excellent digital hygiene and habits. Mailbox backup, exports were highly recommended and used as the downloaded email were erased from the email service or the mailbox capacity would fill up as back then storage capacity would be less than 1GB. 

Nowadays a 50GB mailbox is common so users have neglect 20,000+ unread messages with no impact and seldom consider backup or archiving.

Little Nightmare 2 finally completed after 2 years tinkering