8ch’s worker “C!Odemonkey” wrote:
Josh, a coder for 8ch, wrote the following:
let me clear up some misconceptions:
1. Frederick has a tranny gf: No, this is not true. He did engage in “relations” with a ftm hooker but it was by mistake. He get’s really sensitive when this is brought up (it’s why he added signature verification in January, because a user was spreading rumors) so please stop saying it.
2. 8chan is selling your user data: Again, not true, but only because there is nothing to sell. This will change with infinity next, and there are legitimate data protection issues with 8chan which I’ll address below.
3. Jim owns 8chan: No, he owns the server 8chan runs on. You guys need to stop falling for every trick /ints/ plays. Now theoretically he could seize the domain as he did with 2chan but he already calls the shots anyways so I don’t see why he would.
Now that everything is cleared up, let me tell you what finally forced me to quit. I could handle the incompetence, I could even handle the lifestyle, but I could not — I repeat, I could not — program malware into infinity next while lying to the userbase. I was asked to do it, and I had to say no. As you all know the FBI already has access to IP addresses on 8chan (yes, the FBI actually does have global moderator status funnily enough…), but infinity next is going to go further.
When Google blacklisted 8chan, Jim went apoplectic — literally throwing things around the office in rage. He assumed the costs of running 8chan on the expectation that captcha and ad-sense could be integrated into its successor, infinity next, in order to run a profit. Now that dream was dead, and ever since then both Jim and Frederick have been on a PR “offensive” to get 8chan off the shit list, so to say. Finally an opportunity came up that would allow them to alleviate Google’s concerns about illicit content: a backdoor.
A company known as “Red Hat” — famous for developing the Fedora linux distro — contacted Frederick (presumably at the behest of some alphabet agency) offering to sell what amounts to a keylogger program that could be inserted into infinity next’s code. It would store every single post made by every single user on a database run by Red Hat for the use of law enforcement agencies should they require. After a bit of research I learned that Red Hat is itself an NSA subsidiary, and that the same program has been used by 4chan since 2010. This was presented as an opportunity to “legitimize” 8chan, and thus remove it from the Google blacklist (and perhaps regain access to funding sites that have shut out 8chan).
I was asked to insert this code by Jim personally. I was afraid to say no, so I said I’d get to it, but went straight home and booked a flight. 8chan had become a shadow of what it once was, and I wasn’t about to betray the userbase and become a lackey for the US government. To be honest, I don’t think Frederick wants this either — but what choice does he have? He is heavily disabled, alone in a foreign third world country, and completely dependent on Jim. He’s trapped.
Anyways, that’s my story. I wish it didn’t end this way, I really do. I had to move back in with my mother, who I don’t get along with, and now I have to find an actual job…but I felt obliged to tell you all the truth, and to apologize for the way things turned out. I won’t tell you to quit 8chan like I did, but you should at least know what’s really happening.
Actually, it turns out that I should have been more wary of RedHat. Consider the following old story from 2015:
Red Hat and back doors: poll from FOSS Force
Summary: The return of XKEYSCORE to some media outlets (not news anymore) brings us back to debating Red Hat’s role (also not really news)
QUITE a few sites (see [1-3] below) seem to be talking about Red Hat’s special (but no longer secret) relationship with the NSA, which is not at all news. The NSA uses a lot of RHEL (and also Fedora) on some malicious spying equipment, based on various NSA leaks. We already wrote a great deal about this back in 2013 [1, 2, 3, 4]. The only new thing we learn from the latest articles is that Red Hat continues to refuse to remark on the subject, even when asked by journalists (see the first article below). █
Related/contextual items from the news:
A little over two years ago, the first disclosures about the massive surveillance operation being carried out by the NSA were made in the Guardian, thanks to an intrepid contractor named Edward Snowden.
Now comes the rather disturbing information that the NSA runs its XKEYSCORE program — an application that the Intercept, the website run by journalist Glenn Greenwald, describes as NSA’s Google for private communications — for the most part on Red Hat Linux servers.
If report is correct, Red Hat’s marketing department has a very tricky customer reference
SELinux is a product of the NSA and some worried when it was added to Red Hat, Fedora, and later many other distributions. Even before Snowden revealed the massive government spying, having the NSA anywhere near Linux activated certain Spidey-senses. Now we learn that SELinux may have had an exploit for bypassing the security enforcements. Italian software company Hacking Team, who admits to providing “technology to the worldwide law enforcement and intelligence communities,” has been selling technology to governments (most with bad human rights records) to assist in gathering surveillance data on citizens, groups, journalists, and other governments. Recently Hacking Team was hacked and their information has been leaked onto the Internet. Besides the SELinux exploit, it’s been reported that the FBI, U.S. Army, and the Drug Enforcement Agency are or were customers of Hacking Team’s services.