Whistle Orga Archives
In October of 2017 a group calling themselves Cleaningress released screenshots and the membership list of a Resistance Slack called The Broker's Guild. According to Cleaningress, bots in some of The Broker's Guild channels accessed a database that had been compiled by scraping the Ingress intel site.
Predictably, a scandal erupted in the Ingress community. The information was used to harass the members of The Broker's Guild identified by Cleaningress.
This site contains the archives of the Telegram chat room where the members of Cleaningress collected, organized, and edited the website that published details about The Broker's Guild and it's members.
View ArchivesThis Is Undoubtedly Old, As Is Ours
- Charlie Arnold We can achieve three things here: 1) We can disrupt a bunch of influential RES on an individual basis. They'll either have to own it or deny it, and both will be sort of fun to watch. 2) We can change the gamewide conversation on issues that involve scraping. Like the individual bad actors, Niantic will either have to own it or ignore it, and both would be amusing to watch. 3) We can disrupt RES nationally for a brief period, and since we control the timing we can use that strategically.
Smart, Resourceful People
Getting All The Freaking The Fuck Out Of Our Systems
- Erich Bacher (@thePrevaricator WI, US) Everyone can authenticate to the client via V, but you can also setup a channel that sends you alerts when activity happens in a predefined area. I turned off everything on mine except new portals. Doing that makes you an admin for those channels. Everyone can just not use cactus. If you signed up for a channel, leave it, and remove yourself from the admin sheet.
Yeah, It's Just A Question Of Access
We Could Have Done Great Things
- Erich Bacher (@thePrevaricator WI, US)
{{FWD: Tiernan (NVX) NQ AU, 21.10.2017 00:16:45}}
So there's been RES leaks, and as a result there's been a desire to expose the presumably similar ENL scrapers of the world as well in a similar manner. I don't run such a tool nor am I affiliate with them, but I do run some tools which, just like IITC, do violate the strict letter of the ToS. As operators we've set an arbitrary view on where that line should be and what tools we are and are not comfortable using and that's fine, however rumours of ENL agents wanting to blow open things is concerning to me because I don't know if your opinion on this matter includes eg flipcard databases and portal location information.
As I have absolutely no desire to get caught up in the middle of this sort of thing, anyone suspected of wanting to willingly leak any information on opsec tools as a preventative measure will not have access to any tools I develop.
- Charlie Arnold " On the ENL side, there's enl.wtf, and cactus, and poptart. I don't know much about these things. Factionally, I'm not a cool kid. People know I'm awkward and moralistic. They don't invite me to controversial stuff. That's fine. If I knew more about them, I'd just blow them open. Everyone knows this."
- Erich Bacher (@thePrevaricator WI, US) Nv.io/ingress