I moderated a large Reddit community (circa 2014). She threatened to have articles written about how we were racist/misogynistic, unless we removed comments she didn't like.
If you find an exposed token in the wild, for a service supported by GitHub Secret Scanning, uploading it to a Gist will either immediately revoke it or notify the owner.
it works for any gist, public or private. it doesn't need to follow a certain format. it's just based on how the secret itself is formatted—it works for secrets that have a predictable pattern, like the AWSK prefix for Amazon keys.
if algolia keys have this predictable pattern, then they can enroll in secret scanning. If they don't then they probably can't
The purpose of command and control servers is to send and receive data to victims devices.
A secondary goal is to do so while evading detection. This is why many threat actors piggy-back off of legitimate services, it disguises the malware communications and avoids directly exposing the upstream C2 instance.
Her being nasty elsewhere doesn't surprise me...
reply