Another Spectrum

Personal ramblings and rants of a somewhat twisted mind


Leave a comment

A Twitter violation revisited

Well, it seems there is at least one human at Twitter, or a good imitation of one. I have received a qualified apology. And my reason for “qualified” is as it seems to imply that my account exhibited automated behaviour. I’m still struggling to understand how expanding a very long conversation thread as I was reading it exhibited such behaviour. Perhaps I was reading too fast? But I’ll let it rest for now.

Hello,

We’re writing to let you know that your account is now unlocked. We’re sorry for the inconvenience.

A little background: We have systems that find and remove automated spam Twitter accounts, and it looks like yours was flagged as spam by mistake. This can happen if an account exhibits automated behavior in violation of our rules.

We apologize for the mixup, and hope to see back on Twitter soon. 

If you need to get in touch with us again, please file a report through your Twitter app or our forms page, as this account isn’t monitored for replies. 

Thanks,

Twitter


9 Comments

A Twitter violation?

I know Twitter is coming down hard on those who violate their terms of use, but this is ridiculous.

I haven’t had a personal Twitter account, up until today, and now I’m locked out due to some violation or other, but have absolutely no idea what.

I hadn’t been signed up for more than 3 minutes when I was locked out when a tweet and the comments I was reading disappeared and was replaced with a message stating that my account was disabled until I could verify my identity! On acknowledging the message, I was directed to a screen where I was to enter my phone number As usual in these situations I checked the URL before I did so just to make sure it was valid. It was.

Every attempt at unlocking the account resulted in a silent phone call from Alabama in the USA (I was expecting an SMS message) and an empty email message. Then this message arrived by email:

We’re writing to let you know that your account has been flagged for unusual behavior that violates the Twitter Rules, and has been locked until you take the following steps: 

  1. Log into your account, or open your Twitter app on iOS or Android. 
  2. You’ll see a message about your account, and a prompt to click “Start.”
  3. Select your country/region, and then enter your phone number. 
  4. Click “Send code.”
  5. You’ll receive a message from Twitter with a confirmation code. 
  6. Enter the code you receive on the prompt screen. You’ll receive a confirmation. Please note, it may take a few minutes for your account to be completely unlocked. 
  7. If you’re still experiencing a problem after confirming your identity, respond to this message and provide us with more details about what’s happening. 

Please note, repeat violations of the Twitter Rules can lead to a permanent suspension of your account. 

Thanks, 

Twitter

I have no idea whether the “violation” is in regards to reading tweets and associated comments or whether it’s to do with being unable to verify my account. Keep in mind the only activity I had performed was to view two or three tweets and expand the comments. That was all apart from trying to unlock the account.

I followed the instruction provided as far as step 4. The “message” I’m supposed to receive in step 5 consists of a silent telephone call and an empty email. Impass! I’m at a loss as to how I’m supposed to enter a nonexistent verification code in step 6. I’ve emailed them with the details of what happened but who knows if any action will be taken:

Dear Twitter,
I signed up for an account today and tried to use my mobile phone number to verify my account. I never received an SMS message. After several attempts to resend the verification code, I opted to set up the account using an email address. This worked as I received the 6-digit code and was able to sign in. I received the code at 16:50 NZDT.


I started reading some tweets and as I was expanding some of the comments, a message popped up informing me that Twitter was unable to verify my identity and I needed to enter a phone number. That I did: [Ph number provided]. Almost immediately my mobile phone rang, but on answering it, there was complete silence. I waited a few seconds until the call terminated. The call came from [Ph number provided]. I tried re-sending the code two more times with the same result. I also tried using my home phone number [Ph number provided], again with the same result. 

Shortly afterwards, I received four email messages from info@twitter.com. The sending mail server was [server name and IP address provided]. The emails were all sent sent at 16:55:29 NZDT and were devoid of content. I have included the source code of one of the messages below. A few minutes later, this email to which I am now responding arrived. It was sent earlier than the 4 empty messages at 17:53:34 NZDT.


So my questions are:

  1. In what way have I violated Twitter’s rules?
  2. How do I unlock my account in the absence of a verification code?

Kind regards

Barry

Perhaps I might receive a response in a day or three, but who knows? Has anyone else faced similar situations with the social media giants?


1 Comment

To Alex Berenson: You’re so wrong!

I am aware that Alex Berenson is somewhat of a controversial author, but if his recent claim about indefinite detentions in Aotearoa New Zealand is so wildly inaccurate, how factual are his comments about other causes he promotes? Fact checking on the situation on Aotearoa New Zealand is so simple, that Berenson’s comment borders on being hilarious.

According to a recent tweet, Berenson claims that people here are being detained indefinitely:

https://twitter.com/AlexBerenson/status/1282059985288036358

Knowing Berenson’s opposition to the way most nations are managing the pandemic, I don’t know whether his tweet is a genuine misunderstanding of the context, or he is being deliberately disingenuous.

Let’s get the story straight shall we?

  • Currently our borders are closed to everyone attempting to enter the country except for NZ citizens, residents and those who have qualified for special exemptions. There is no restriction on anyone leaving the country.
  • Everyone arriving in New Zealand must go into managed isolation for two weeks.
  • There is a high level of trust required of those in isolation. They are put up in mostly 4 and 5 star hotels at taxpayer expense and the facilities are made “secure” by the way of temporary fencing of the type typically seen around construction sites. As has been demonstrated by one “escapee”, it is very easy to cut the plastic ties that hold the fencing together.
  • Of the more than 30,000 people that have passed through managed isolation, just four have broken the rules and left the premises where they were isolated without gaining permission.
  • There is no indefinite confinement. The statement that thousands of people will be quarantined in isolation facilities for months and possibly years was in reference to the protocol of requiring inbound travellers to isolate for 2 weeks in managed isolation.
  • When the 2 week isolation period is up, the returnees are free to go about their lives as we all are: no social distancing; no masks; unrestricted crowd sizes; sports facilities, bars, restaurants, nightclubs etc operate as normal. In other words, business as normal.
  • There is no community transmission of COVID-19 in Aotearoa New Zealand
  • The NZ COVID-19 cases being reported to WHO are those of people in managed isolation who tested positive within the managed isolation period. In other words, they contracted the virus before arriving in the country.
  • If it wasn’t for the fact that most countries have failed to get COVID-19 under control, this country would have no need for border restrictions at all.

While I’d like to think that it was a genuine error on Berenson’s part, the fact that he has not removed the tweet or made a correction is telling.

Perhaps what is less surprising is the fact that so many people accept the tweet as factually correct, even though many Kiwis have replied, made it clear the comments by Michael Baker, professor of public health at Otago University have been taken entirely out of context. In fact a quick scan of the comments and retweets seem to indicate that only Kiwis are contesting the accuracy of Berenson’s tweet. Is the rest of the world really so ignorant and willing to believe a lie?

As one Kiwi tweeted “Who needs comedy when you have Americans on Twitter”. With that, I can’t help but nod my head in agreement.


5 Comments

Come on then, I dare you…

I am reasonably tech savvy. I worked in the I.T. industry for 35 years providing technical support in the banking and retailing sector, and although I retired from the industry almost 20 years ago, I have retained an interest in it, and in computing in general.

So when my Spam filter catches an email such as the one below, I sigh, knowing every claim made is absolutely false. I don’t need to fear that there might be a chance that what I view online will be disclosed to anyone I might (or might not) know.

While I prefer to keep my online browsing preferences private, there is nothing that would be terribly embarrassing or worse if others were to discover them. And to ensure that I don’t stumble across websites I’d rather not see, my home network makes use of DNS filtering through OpenDNS.

It’s not perfect. I stumbled upon copies of the Christchurch shooter’s live streaming of the event when it appeared on popular social media sites in the days after the incident, even here on WordPress. But for me personally, I appreciate the high level of selective filtering it provides, so the chances of any user on my home network being able to view an online pornographic video are remote.

Leaving aside the remote possibility of anyone watching porn from my home network, let alone my computer, and for the benefit of the scammer, here’s why the email can safely be ignored:

Hello,

Hello to you too. If you had access to my computer as claimed further below, I’d expect you to know my name, and to use it to prove the legitimacy of your claim. Using a salutation without my name is the first indication that you really know nothing about me

As you may have noticed, I sent this email from your email account (if you didn’t see, check the from email id). In other words, I have fullccess to your email account.

No you didn’t. Spoofing the from address is an extremely simple and trivial process. Every email client (even Outlook Express)  provides an easy means of doing so. Besides, a quick check of the email header, provides all the information I need to know that the message originated somewhere other than my own email account. In this particular case you relayed your email via a Yahoo mail server located in the USA.

I infected you with a malware a few months back when you visited an adult site, and since then, I have been observing your actions.

Really? Even on the very remote chance that I accidentally came across an “adult” site and that the site contained malware you had inserted, the odds of it being code that could infect my computer are orders of magnitude smaller. I don’t use a popular Web browser and I don’t use a popular operating system. While no operating system is perfect, any vulnerabilities discovered in Linux are patched almost immediately. This is one of the advantages of using an open source operating system. So unless your code is targeted specially towards Linux, and is using some as yet unidentified vulnerability that you discovered more than a year ago, it’s simply not possible to install malware at the operating system level.

The malware gave me full access and control over your system, meaning, I can see everything on your screen, turn on your camera or microphon and you won’t even notice about it.

Even in the extremely remote chance that malware has been installed, and that it had managed to gain root access when my logon user ID hasn’t, nor do any of the applications, including web browsers, have root access, your claim that the malware was capable of manipulating my camera and microphone is laughable, You see, there needs to be a camera or microphone for you to manipulate. There isn’t. But ignoring that inconvenient truth, shall we continue?

I also have access to all your contacts.

Aside from having access to a nonexistent camera, your malware, you would need to have an intimate knowledge of my operating system, and the software installed. Your malware would have to know what software I use for my contacts and where on the system the information was stored. Give me that information and I might believe you.

Why your antivirus did not detect malware?
It’s simple. My malware updates its signature every 10 minutes, and there is nothing your antivirus can do about it.

As I run Linux on my computer, I have no need for antivirus software. You also clearly don’t understand what a signature is. It is not something within your malware. It’s something antivirus applications create from information gleaned from malware. It doesn’t matter how much your malware modifies bits of its code, the antivirus folk are clever enough to figure out how the modifications are made and build in a suitable method of identification. And as you have been sending me identical messages for more than a year, I have every confidence that if in fact there was any malware at all, every antivirus application would have long ago figured out how to identify it. So I have every confidence that even if I did run a version of Windows or MacOS, which I don’t, I would be well protected by any antivirus program I chose.

I made a video showing both you (through your webcam) and the video
you were watching (on the screen) while satisfying yourself.
With one click, I can send this video to all your contacts (email, social network, and messengers you use).

I’m rather fascinated by your claim. In fact I look forward to viewing said video. I’ve looked and looked, but for the life of me, I cannot find this web cam. Can you enlighten me?

You can prevent me from doing this.
To stop me, transfer $989 to my bitcoin address.
If you do not know how to do this, Google – “Buy Bitcoin”.

My bitcoin address (BTC Wallet) is 1Hmn2KAK2Z3VjkpMz26nmh9KVAV6KqYiYp

If you have access to my computer, could you not have simply accessed my bank account and my credit card details?  The username and password for my online banking are stored in encrypted form within my web browser and surely it would be a trivial matter for you to obtain it, especially if you have access at the operating system level. You wouldn’t even need to decrypt the password. With your supposed knowledge it should be a trivial exercise to fool the browser into decoding it for you.

After receiving the payment, I will delete the video,
and you will never hear from me again.
You have 48 hours to pay. Since I already have access to your system
I now know that you have read this email, so your countdown has begun.

As it’s been close to 9000 hours since I received your first email, and I have received around to 200 subsequent messages, why should I believe this 48 hour deadline is any more final than all the others? It’s quite obvious that you have no idea whether or not I have read your message. The most common technique for knowing if an email has been read is by embedding web link to a transparent 1 x 1 gif. My email application does not display linked images by default. I have to explicitly enable it for each message. The other common technique is to include a flag requesting an acknowledgement when an email is read. My email application is configured to never send an acknowledgement. Besides, I read the contents of your email from within my online Spam filtering system control panel, which, not being an email client, can not open links nor send acknowledgements.

Filing a complaint will not do any good
because this email cannot be tracked.
I have not made any mistakes.

You fail to understand how emails are sent. I can tell exactly the last server and location that the message passed through before it arrived at my mail server (yes, I have my own mail server). Armed with that information and the cooperation of email server hosts, I can track the message to a vpn and beyond, or to a compromised computer. I’ll concede that I’m unlikely to find your identity, but that’s of little concern.

If I find that you have shared this message with someone else, I will immediately send the video to all of your contacts.

Well, as you can see I have shared it. Come on then, send the video. I dare you.

Take care

Of what?

Some further details for those still reading: Some of the messages contain a username and password that I possibly did use many years ago, but not in the last ten years. Over the three decades that I have had online access (does anyone remember NCSA Mosaic?), I have been notified a few times that a website I use has been hacked and and there’s a remote chance that user credentials might have been compromised. This is the most likely source of the user credentials included in some of the scam attempts. In most cases, they have been sites that I had stopped using, but even in the two cases where I am still an active user, I’m not particularly concerned.

You see, I never use the same username and password on more than one site. Yes folk, I’m one of those nerds that use a different user ID and password for every website, and for every computer login. Perhaps I’m fortunate in that I also own several domain names, and can create an unlimited number of email addresses. So even though a great many websites now require an email address as the user ID, I can still create a unique email address/user ID for each and every site.

What the scammer probably doesn’t realise is that every Spam filtering system worth its salt, now recognises such messages as Spam, and will have done so for many months. The intended recipient is unlikely to even see these blackmail attempts.


8 Comments

Believe the Internet

I’ve always known the Internet to be a rich and accurate source of information. Today it revealed something that I wasn’t aware of, or had forgotten:

I have a PhD in history.

I don’t actually recall studying for it, but according to this test, my 100% correct result came about because of my education level; that being the said PhD. As more than half the questions were about American history, I presume my thesis was related to that, or perhaps I studied in an American university. I have no recollection of either, but a perfect score is unequivocal evidence of my great intellect.

Now where did I put my certificate and my thesis?


Leave a comment

Update Aotearoa – 11th April 2019

NZ’s environmental watchdog challenges climate policy on farm emissions and forestry offsets

The greenhouse gases methane and nitrous oxide, from burping and urinating livestock, account for about half of New Zealand’s total emissions. These agricultural emissions have been the elephant in the room of New Zealand climate policy for some time.

report released by the Parliamentary Commissioner for the Environment (PCE) this week suggests New Zealand should treat biological emissions differently from carbon dioxide emissions. It also says afforestation is a risky approach to combating climate change if planting trees is used to offset carbon emissions.

The report threatens to turn environmental policy and its principal policy tool, the New Zealand Emissions Trading Scheme (NZ ETS), on its head.

Read more…

New Zealand’s Pacific reset: strategic anxieties about rising China

China’s expanding influence is complicating strategic calculations throughout the Asia-Pacific region.

Small states, dependent on maintaining high levels of trade with China to secure their prosperity, are loathe to criticise or take actions that Beijing could find objectionable. This is creating a dilemma over how small states can protect their national interests at a time when China’s growing influence threatens the status quo.

New Zealand illustrates this dynamic. It watches China extend its influence into the microstates of the South Pacific, a region where New Zealand (and its ally Australia) have long enjoyed a position of prominent influence.

Read more…

New Zealand’s new gun law: What you need to know

Politicians have almost unanimously passed a ban on high-power guns in response to the Christchurch mosque attack.

So what will change, what won’t, and how did it happen?

ALMOST UNANIMOUSLY?

Of 120 members parliament, only one opposed the changes: the libertarian Act party’s sole MP, David Seymour. He argued the laws have been rushed through too quickly and without enough consultation.

By legislative standards, the process has moved at lightning speed. Lawmakers often mull bills for at least six months. Friday will mark four weeks since the March 15 terror attack that killed 50 people in Christchurch.

Read more…

Why A New Zealand Official Insists ‘Facebook Can’t Be Trusted’

Rachel Martin talks to New Zealand’s Privacy Commissioner John Edwards, who criticized Facebook after last month’s attacks on two mosques in Christchurch were live-streamed on Facebook.

Read more…

 


Leave a comment

Hacked router follow up

I was hoping for an interesting episode this morning following yesterday’s fake Spark call regarding a hacked router. It was rather a let down.

The call didn’t come until 10:30 am – an hour late. The caller seemed to be unaware of yesterday’s call, while I stuck to role playing a continuation from yesterday. I kept interrupting their prepared script to tell the caller that I was fully aware that why they were calling and could they just cut to where they could fix it. Eventually I got put through to the “national router specialist” who would help me. As he started through his script, I continued to interrupting to virtually repeat what he was about to say. This would totally confused him and he would start off from the beginning again each time I fell silent. I’m sure his ability to understand what I was saying was almost zero, but hey, I’m an elderly guy with a strong Kiwi accent and I played the role of a bloke that is rather short of patience. He struggled for around 15 minutes to make headway, but it was blindingly obvious that he was not able to deviate from his prepared script. I reminded him that someone from Spark called yesterday, which he denied, so I asked how I knew what he was going to say before he said it. Then he hung up.

I’m sure they’ll call again in a few weeks. and I’ll try to play a more patient personality. Today’s effort only wasted little more than fifteen minutes of their time. I do hope it was sufficient to keep at least one person out of their grasp.


1 Comment

Fellow Kiwi Blogger Bill Peddie provides another example of how Trump’s unilateralism has the potential to cause more harm than good.

And while Trump might have a point that Russia has not followed the letter of the INF nuclear treaty, it can also be argued that America has not followed the spirit of it by developing drone technology as an alternative nuclear weapons delivery system.

Although I follow what President Trump is trying to give as his real reason for pulling out of the current long-standing INF nuclear treaty with Russia, it is more than a little worry that we are left to puzzle why he comes across as one who talks as if he is unaware of some recent history of nuclear treaties. […]

via WHAT PRESIDENT TRUMP FORGOT TO MENTION — Bill Peddie’s website


3 Comments

Internet? What Internet?

As I mentioned in my previous post, accessing the Internet in Japan was problematic. On board the cruise ship, WiFi was free, but that only provided access to on board facilities. Internet access was expensive. I made the decision to purchase 10 hours of access which set me back US$200. I shouldn’t have bothered. Communication by smoke signals would have been faster and more reliable. Frequently the network went down, and while down it was impossible to log off, meaning the clock kept on counting down the time I had left.

On board, the transfer rate was very slow. Who remembers dial-up internet of the early 1990s? That was fast compared to what I could get, even when the ship was in port. I found it better to go onshore and seek out a WiFi hot spot. But even then I frequently ran into problems.

WiFi hot spots are to be found everywhere in Japan, but most seem to require a subscription with a service provider to use for anything other than a very short trial period. Often the amount of personal information that had to be divulged even to use the trial period was too much for my comfort, and I’d abandon the sign up process. Those that really were free often had very little bandwidth, and weren’t much better than on the ship. I noticed too, that many of the hot spot providers required the use of a smart phone that had been purchased in Japan. Foreign purchased phones simply would not work.

The best connections I found were in restaurants, shopping centres and railway stations. Hotels and inns were a mixed lot. It seemed that the bigger the place was, the less reliable the Internet connection. There were two factors here. In large establishments the WiFI signal strength could be patchy, and while it might be strong in the lobby or dining rooms, it frequently was very weak in our room. The other issue was bandwidth.

I swear that the larger the establishment, the smaller the capability of the router. We stayed at a number of small inns with as few as five guest rooms. Here I could get speeds approaching the ADSL speeds at home. But in larger places, data transfer slowed to a snail’s pace, especially in the evenings. Even achieving 1KB/sec in some places was an achievement. Talk about being frustrated! I abandoned all hope of blogging, and managing my part time online business became a nightmare.

I use Google Photos to automatically sync pictures and videos taken on my phone to the cloud and my other devices. By the time we left Japan, less than 5GB of the 32GB I’d taken had been uploaded. A similar amount uploaded while we waited for a connecting flight at Auckland Airport. The rest uploaded by the time we woke the next morning.

We don’t have a fast connection at home: 10MB download and 1MB upload, but it still seems fast compared to what I experienced in Japan. I don’t know how unique my experience with the Internet in Japan is, but both my daughter and her husband had similar experiences. Perhaps we were just unlucky.

Speaking of Internet speeds, I really must hurry up and choose a high speed fibre provider. After all, there’s been fibre running right past out gate for more than a year now. Most providers charge no more, and frequently less than I’m paying for my copper ADSL service. The only problem I’m having is choosing which provider to go with. Soooo many of them, and every one of them has numerous plans. Contract or no contract? With or without phone line? 100MB or 1GB? With or without Netflix? Metered or unmetered? According to one comparison website, I have 1,960 different plans to choose from. Help!!