Why this blog?
Until this moment I have been forced to listen while media and politicians alike have told me "what Canadians think". In all that time they never once asked.
This is just the voice of an ordinary Canadian yelling back at the radio -
"You don't speak for me."
email Kate
Goes to a private
mailserver in Europe.
I can't answer or use every tip, but all are appreciated!
Katewerk Art
Support SDA
Paypal:
Etransfers:
katewerk(at)sasktel.net
Not a registered charity.
I cannot issue tax receipts
Favourites/Resources
Instapundit
The Federalist
Powerline Blog
Babylon Bee
American Thinker
Legal Insurrection
Mark Steyn
American Greatness
Google Newspaper Archive
Pipeline Online
David Thompson
Podcasts
Steve Bannon's War Room
Scott Adams
Dark Horse
Michael Malice
Timcast
@Social
@Andy Ngo
@Cernovich
@Jack Posobeic
@IanMilesCheong
@AlinaChan
@YuriDeigin
@GlenGreenwald
@MattTaibbi
Support Our Advertisers
Sweetwater
Polar Bear Evolution
Email the Author
Pilgrim's Progress
How Not To Become A Millenial
Trump The Establishment
Wind Rain Temp
Seismic Map
What They Say About SDA
"Smalldeadanimals doesn't speak for the people of Saskatchewan" - Former Sask Premier Lorne Calvert
"I got so much traffic after your post my web host asked me to buy a larger traffic allowance." - Dr.Ross McKitrick
Holy hell, woman. When you send someone traffic, you send someone TRAFFIC.My hosting provider thought I was being DDoSed. - Sean McCormick
"The New York Times link to me yesterday [...] generated one-fifth of the traffic I normally get from a link from Small Dead Animals." - Kathy Shaidle
"You may be a nasty right winger, but you're not nasty all the time!" - Warren Kinsella
"Go back to collecting your welfare livelihood. - "Michael E. Zilkowsky
No Canadians…..?
No nobody it seems…
/j #legion /msg Interpol The idea behind the mask remains at large. :))
Good for show and tell but I doubt if they busted anything of value. Trying for some deterent threats. The weakest links. True hackers will cover their tracks as they always seem to be a couple steps in front of the people they are pis*ing off.
The script kiddies got caught….but yeah, there’s more, pretty much harmless
A la OWS, Anonymous is ideologically bent, and likes to target those it defines as unrighteous, and defend those it defines as righteous. Narcissism is on display when it needs to ‘announce’ its conquests, as if to beat its chest in public, and that ultimately is, or will be, its undoing.
Superhero-ish altruism, invincibility and invisibility of ‘true hackers’ like Anonymous, Batman, Tron, whomever, exist only in movies, mystery novels and other products of the imagination.
Any time you are connecting to ftp server i.e. downloading software updates, you are Anonymous.
Anonymous is anybody, could be everybody.
I understand they were traced to their mothers’ basements.
Even the hacker nerds seem to be unaware of the third party monitor capability of the integrated modems on their lap tops. Every keystroke is captured by super user. In this case Interpol.
The Anonymous guy is everywhere, all comments on this blog are by Anonymous.
It may be off subject, but i would like to quote one comment from the linked blog above.
“Hi Israeli friend, I am Iranian and I can tell you that what you see on your TV is false. Iranians like Israel and Israeli people, our enemy is the Islamic regime in our country, it is a retrograde force against the culture and identity of Iran, it represents Arab barbarism and not Iranian glory.
Iran and Israel will hopefully be friends some day in the future.
Love from Mohsen, using VPN in Tehran University.
xiat >
“Mohsen” sounds a little like someone with a Liberal mental illness. It could probably happen in any soft and lazy entitlement environment like Tehran U.
Most likely that Mohsen will be found on Utube one day hanging from a crane by the neck in a public square, while the western left continues its support of Islam.
I wonder if Anonymous is part of that ingenious black exchange set up by 2 Ukrainian mobsters-
one side brings in something of potential value, say, a stripped list of credit card holders;
the other side wants to buy it.
The exchange provides an escrow account where each criminal can safely examine the other’s goods. If both are satified, the deal goes through.
You can buy code, spam, viruses, databases… anything cyber you want!