From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 13141 invoked from network); 3 Apr 2022 03:50:56 -0000 Received: from 4ess.inri.net (216.126.196.42) by inbox.vuxu.org with ESMTPUTF8; 3 Apr 2022 03:50:55 -0000 Received: from 5ess.inri.net ([107.191.111.177]) by 4ess; Sat Apr 2 23:45:07 -0400 2022 Message-ID: <5E6CE2D8D574227A0B8A33E0A6A2C51E@5ess.inri.net> Date: Sat, 02 Apr 2022 23:26:14 -0400 From: sl@stanleylieber.com To: 9front@9front.org In-Reply-To: <1E26D2D8-C31B-4DAC-A479-846E66E58F4A@stanleylieber.com> MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: RESTful mobile dependency polling solution Subject: Re: [9front] 4chan hacked rc-httpd Reply-To: 9front@9front.org Precedence: bulk known 4chan coverage of 9front is archived here: http://9front.org/press/4chan.org/ now updated with latest thread, plus excerpts of logs captured during the attack. sl