{"id":46992,"date":"2021-01-25T07:20:55","date_gmt":"2021-01-25T12:20:55","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=46992"},"modified":"2021-01-25T07:20:55","modified_gmt":"2021-01-25T12:20:55","slug":"nothing-online-is-completely-private-parler-data-dump-of-ethically-hacked-posts","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=46992","title":{"rendered":"Nothing online is completely private: Parler data dump of &#8220;ethically hacked posts&#8221;"},"content":{"rendered":"\n<p>NYTimes: <a href=\"https:\/\/www.nytimes.com\/2021\/01\/25\/opinion\/parler-social-media.html?action=click&amp;module=Opinion&amp;pgtype=Homepage\">How Parler Reveals the Alarming Trajectory of Political Violence<\/a> by Candace Rondeaux and Heather Hurlburt:<\/p>\n\n\n\n<!--more-->\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Data sleuths have combed through a 70 terabyte cache of data from Parler, the now-defunct social media platform popular among the far right. Researchers have archived and mapped millions of these ethically hacked posts, wrangled by an anonymous, purportedly Austria-based hacker. The haul \u2014 potentially bigger than the WikiLeaks data dump of the Afghan War logs and the Democratic National Committee leak, combined \u2014 includes valuable evidence and planning of further attacks, mixed in with the private data of individuals who committed no crimes (along with quite a bit of pornography). The early takeaways are terrifying: According to at least one preliminary analysis, the frequency of hashtags on Parler referencing hanging or killing duly elected members of Congress more than doubled after the November elections.<\/p><\/blockquote>\n\n\n\n<p>Admissions posted on social media can become evidence. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>NYTimes: How Parler Reveals the Alarming Trajectory of Political Violence by Candace Rondeaux and Heather Hurlburt:<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[125,79],"tags":[],"class_list":["post-46992","post","type-post","status-publish","format-standard","hentry","category-digital-privacy","category-third-party-doctrine"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/46992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=46992"}],"version-history":[{"count":1,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/46992\/revisions"}],"predecessor-version":[{"id":46993,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/46992\/revisions\/46993"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=46992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=46992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=46992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}