Feeds

Anonymous Indonesia claims attacks by Anonymous Australia

Warring factions in division by zero error

Secure remote control for conventional and virtual desktops

Entities using the name and iconography of Anonymous (EUTNAIOA) and claiming to be the Indonesian branch of the movement have accused entities using the name and iconography of Anonymous and claiming to be the Australian branch of the movement of attacks on Indonesia's national airline Garuda and other hostile actions.

We are using the rather silly language above because when we last week reported on a threat from Entities … let's just shorten that to EUTNAIOA from now on … reported on a threat from EUTNAIOA Australia to EUTNAIOA Indonesia, anons from around the world ridiculed the story and pointed out that one of the movement's mottos is “United as one, divided by zero.”

Anon vs. Anon is therefore impossible, they suggested, and our story was bunk.

How then to explain the Tweets below from the @anon_indonesia account?

(Translation: It is wishful to forget that there are three parties to assist us. 3rd party who exploit Indonesia-conflict situations is anonymous international Australia)

(Translation: Anon Australia claims to have hacked Garuda Indonesia website, but only to leak the database. Why? Because they could not find the administration page to upload the deface file)

One explanation comes from EUTNAIOA Australia, which has denied the allegations in the tweets above and says the Indonesian press, especially merdeka.com/, is telling porkies about the true situation.

“We do not want to war,” EUTNAIOA Australia say in a new video. “We only wish to join together and expose our governments, not harm each other. There has been a lot of [sic] propoganda and misleading lies that has been said by the Indonesian community.”

It's hard to say if either nation's EUTNAIOA truly understands what's going on here. Perhaps it's all best understood as a division by zero error? ®

New hybrid storage solutions

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.