Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A terrorist group with the power of sudo is a scary thought.

Obligatory XKCD: http://xkcd.com/149/



Right. Because that's all they do. Let's see:

1) Stole from Symantec and released the code: https://thepiratebay.se/torrent/7014253

2) stole from pcanywhere and released the code: http://www.zdnet.co.uk/news/security-threats/2012/02/07/anon...

Funny thing is, Google does the same thing with the GPL (IE: "theft" of code): http://mjg59.dreamwidth.org/8991.html and the people here on HN want to crucify them.

It's so easy to hide behind a handle/username online. It takes no balls or courage because you have little to no risk. The mere fact that they do this shows me that they aren't really serious about their views and are most likely anti-social kids (or adults with the maturity of kids).

This is stuff that I would have enjoyed when I was 15.


Relax, he was just poking fun at your error in using 'sudo' (the linux super-user command) instead of 'pseudo' (the prefix meaning counterfeit).

Not sure if this is a response to the joke or not, though...


I ... think it might have been intentional. Notice the xkcd comic.


You think that was an error? come on, it's HN!


I don't know what Fox News told you old geezers, but anonymous is not a group. Governments can act in the name of anonymous, and I'm sure they do (surprise!). You're missing the point, but that won't stop you from spewing your condescending garbage.


right. It's not a group. Also, way to generalize!

If a government attacked people they didn't agree with without a trial (Even under the name "Anonymous"), I don't think I would agree with them either.

Anyone using the name "Anonymous" to attack another that they don't agree with is wrong.

I don't like the people the people at the wall street protests so I'm going to steal all their credit card info or fake a police report that they are child molesters. But don't worry, it's all under the name Anonymous...so it's okay!!!!!!!


those examples are from the same theft




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: