Inside the precision hack

contact18There’s a scene toward the end of the book Contact by Carl Sagan, where the protagonist Ellie Arroway finds a Message embedded deep in the digits of PI. The Message is perhaps an artifact of an extremely advanced intelligence that apparently manipulated one of the fundamental constants of the universe as a testament to their power as they wove space and time. I’m reminded of this scene by the Time.com 100 Poll where millions have voted on who are the world’s most influential people in government, science, technology and the arts. Just as Ellie found a Message embedded in PI, we find a Message embedded in the results of this poll. Looking at the first letters of each of the top 21 leading names in the poll we find the message “marblecake, also the game”. The poll announces (perhaps subtly) to the world, that the most influential are not the Obamas, Britneys or the Rick Warrens of the world, the most influential are an extremely advanced intelligence: the hackers.

kg9kl

At 4AM this morning I received an email inviting me to an IRC chatroom where someone would explain to me exactly how the Time.com 100 Poll was precision hacked. Naturally, I was a bit suspicious. Anyone could claim to be responsible for the hack – but I ventured onto the IRC channel (feeling a bit like a Woodward or Bernstein meeting Deep Throat in a parking garage). After talking to ‘Zombocom’ (not his real nick) for a few minutes, it was clear that Zombocom was a key player in the hack. He explained how it all works.

The Beginning

Zombocom told me that it all started out when the folks that hang out on the random board of 4chan (sometimes known as /b/) became aware that Time.com had enlisted moot (the founder of 4chan) as one of the candidates in the Time.com 100 poll. A little investigation showed that a poll vote could be submitted just by doing an HTTP get on the URL:

       http://www.timepolls.com/contentpolls/Vote.do
          ?pollName=time100_2009&id=1883924&rating=1

where ID is a number associated with the person being voted for (in this case 1883924 is Rain’s ID).

Soon afterward, several people crafted ‘autovoters’ that would use the simple voting URL protocol to vote for moot. These simple autovoters could be triggered by an easily embeddable ‘spam URL’. The autovoters were very flexible allowing the rating to be set for any poll candidate. For example, the URL

               http://fun.qinip.com/gen.php?id=1883924
                     &rating=1&amount=160

could be used to push 160 ratings of 1 (the worst rating) for the artist Rain to the Time.com poll.

In early stages of the poll, Time.com didn’t have any authentication or validation – the door was wide open to any client that wanted to stuff the ballot box. Soon these autovoting spam urls were sprinkled around the web voting up moot. If you were a fan of Rain, it is likely that when you visited a Rain forum, you were really voting for moot via one of these spam urls.

Soon afterward, it was discovered that the Time.com Poll didn’t even range check its parameters to ensure that the ratings fell within the 1 to 100 range. The autovoters were adapted to take advantage of this loophole, which resulted in the Time.com poll showing moot with a 300% rating, while all other candidates had ratings far below zero. Time.com apparently noticed this and intervened by eliminating millions of votes for moot and restoring the poll to a previous state (presumably) from a backup. Shortly afterward, Time.com changed the protocol to attempt to authenticate votes by requiring that a key be appended to the poll submission URL that consisted of an MD5 hash of the URL + a secret word (AKA ‘the salt’).

“Needless to say, we were enraged” says Zombocom. /b/ responded by getting organized – they created an IRC channel (#time_vote) devoted to the hack, and started to recruit. Shortly afterward, one of the members discovered that the ‘salt’, the key to authenticating requests, was poorly hidden in Time.com’s voting flash application and could be extracted. With the salt in hand – the autovoters were back online, rocking the vote.

Another challenge faced by the autovoters was that if you voted for the same person more often than once every 13 seconds, your IP would be banned from voting. However, it was noticed that you could cycle through votes for other candidates during those 13 seconds. The autovoters quickly adapted to take advantage of this loophole interleaving up-votes for moot with down-votes for the competition ensuring that no candidate received a vote more frequently than once every 13 seconds, while maximizing the voting leverage.

One of the first autovoters was MOOTHATTAN.  This is a simple moot up-voter that will vote for moot about 100 times per minute. (Warning, just by visiting that site, you’ll invoke the autovoter – so if you don’t want to hack the vote, you should probably skip the visit).

moothatten11

Here’s a screenshot of another autovoter, a program called Mooter, developed by rdn:

mooter

Mooter is a Delphi app (windows only) that can submit about 300 votes per minute from a single IP address. It will also take advantage of any proxies and cycle through them so that the votes appear to be coming from multiple IP addresses. rdn, the author of Mooter, has used Mooter to submit 20 thousand votes in a single 15 minute period. In the last two weeks, (when rdn started keeping track) Mooter alone has submitted 10,000,000 votes (about 3.3% of the total number of poll votes).

From the screenshot you can see that Mooter is quite a sophisticated application. It allows fine grained control over who receives votes, what type of rating they get, voting frequency, the proxy cycle, along with charts and graphs showing all sorts of nifty data.

In addition to highly configurable autovoting apps, the loose collective of #time_vote maintains charts and graphs of the various candidate voting histories. Here’s a voting graph that shows the per-minute frequency of votes for boxer Manny Pacquiao.

manny-graphMore charts are available for browsing at (the very slow to load) http://fun.qinip.com/mvdc/mootvote.php

So with the charts, graphs, spam URLs and autovoters #time_vote had things well in hand. Moot would easily cruise to a victory. Although they still had some annoying competition, especially from fans of the boxer Manny Paquoia. Zombocom says that “it can take upwards of 4.5K votes a minute to keep Manny in his place”. Despite the Manny problem, the #time_vote collective had complete dominance of the poll.

The Ultimate Precision Hack

At this point Zombocom was starting to get bored and so he started fiddling with his voting scripts. Much to his surprise, he found that no matter what he did, he was never getting banned by Time.com. Zombocom suspects that his ban immunity may be because he’s running an ipv6 stack which may be confusing Time.com’s IP blocker. With no 13 second rate limit to worry about, he was able to crank out votes as fast as his computer would let him – about 5,000 votes a minute (and soon he’ll have a new server online that should give him up to 50,000 votes a minute.) With this new found power, Zombocom was able to take the hack to the next level.

Zombocom joked to one of his friends “it would be funny to troll Time.com and put us up as most influential, but since we are not explicitly on the list we’ll have to spell it out. ” His friend thought it was impossible. But two weeks later, “marblecake’ was indeed spelled out for all to see at the top of the Time.com poll.

So what is the significance of ‘marblecake’? Zombocom says: ” Marblecake was an irc channel where the “Message to Scientology” video originated. Many believe we are “dead” or only doing hugraids etc, so I thought it would also be a way of saying : we’re still around and we don’t just do only “moralfag” stuff .

To actually manipulate the poll, Zombocom wrote two perl scripts. The first one, auto.pl is pretty simple. It finds the highest rated person in the poll that is not in the desired top 21 (recall, there are 21 characters in the Message) and down-votes them (you can view this as eliminating the riff-raff). The second perl script, the_game.pl is responsible for maintaining the proper order of the top 21 by inspecting the rating of a particular person and comparing that rating to what it should be to maintain the proper order and then up-voting or down-voting as necessary to get the desired rating. With these two scripts, (less than 200 lines of perl) Zombocom can put the poll in any order he wants.

Ultimately, this hack involved lots of work and a little bit of luck. Someone figured out the voting URL protocol. A bunch of folks wrote various autovoters, which were then used by a thousand or more to stack the vote in moots favor. Others, sprinkled the spam urls throughout the forums tricking the ‘competition’ into voting for moot. When Time.com responded by trying to close the door on the hacks, the loose collective rallied and a member discovered the ‘salt’ that would re-open the poll to the autovoters. The lucky bit was when Zombocom discovered that no matter what he did, he wouldn’t get banned. This opened the door to the fine grained manipulation that led to the embedding of the Message.

At the core of the hack is the work of a dozen or so, backed by an army of a thousand who downloaded and ran the autovoters and also backed by an untold number of others that unwittingly fell prey to the spam url autovoters. So why do they do it? Why do they write code, build complex applications, publish graphs – why do they  organize a team that is more effective than most startup companies? Says Zombocom: “For the lulz”.

, , ,

  1. #1 by anonymous on April 15, 2009 - 4:22 pm

    MARBLECAKE FOREVER!!!!!!!!111!!!!eleven!!1~

    • #2 by harrr on April 28, 2009 - 6:34 pm

      the lulz indeed

    • #3 by Music lover on May 1, 2009 - 12:53 pm

      really these guys should work on putting the pathetic RIAA and associated organisations in their place.

  2. #4 by pruneau on April 15, 2009 - 4:55 pm

    This also points out to the incredible mis-managment of the voting server, as well as the total lack of QA for the voting application.
    I’m not downplaying the technical feats, but really what a show of we_do_not_know_what_we_are_doing ™.
    Though a comment or two in the general vicinity of “too much time on their hands” comes to mind ;-)

    Now, back to music machinery business will’ya ?

    • #5 by plamere on April 15, 2009 - 4:59 pm

      @pruneau – this relates directly to the music machinery business. If a poll run by a large media company (that should know how to run a poll) is so easily hacked, and with such finesse, by a loose collective, for fun, imagine what an organized group, motivated by money could do to a social music recommender. The next time you get a recommendation that says something like ‘people who like XXX also like Coldplay’ think hard about how that recommendation came about.

      • #6 by Henrik on April 27, 2009 - 3:49 pm

        Honestly, I think /b/ would be able to have a bigger impact than any other kind of hacker group.

      • #7 by Reminder on January 30, 2010 - 4:14 am

        Rules 1 & 2

  3. #8 by debcha on April 15, 2009 - 5:32 pm

    Paul, this is fantastic geek investigative journalism.

    • #9 by ec on July 23, 2009 - 3:05 pm

      So then why couldn’t a countries election vote be hacked also?

      • #10 by zeeman on August 25, 2009 - 4:07 am

        That’s the most idiotic mental leap I’ve ever seen. How do you get from geeks messing around to hacking elections? Yeah, shit from companies like Diebold is insecure, but it’s not able to be hacked just by sending URLs.

  4. #11 by justsomeguyfromjc on April 15, 2009 - 9:05 pm

    I just lost the game

  5. #12 by anonymous on April 15, 2009 - 9:24 pm

    i lold… i lost the game

  6. #13 by PushDustIn on April 15, 2009 - 9:24 pm

    This is an interesting article…I’m fascinated by the applications that were built for this poll. I honestly thought it was just scripts that were being run on websites that were activated when users visited them(like the MOOTHATTAN).

  7. #14 by probabilityzero on April 15, 2009 - 10:26 pm

    I’ve been following this for a while, and I can’t help but giggle in geeky laughter every time I see the top list.

    Alas, however, I just lost the game.

  8. #15 by Vadim P. on April 15, 2009 - 10:32 pm

    Time for time.com to fire its developers and hire someone who knows shit about security practices.

    • #16 by woot on January 28, 2010 - 6:53 pm

      like, maybe they could hire Zombocom?

  9. #17 by JT on April 15, 2009 - 10:34 pm

    No mention of decoding the flash to find the salt for the md5 key (‘lego-rules’, incidentally). The URL shown above is WRONG.

    http://www.timepolls.com/contentpolls/Vote.do
    ?pollName=time100_2009&id=1883924&rating=1

    the actual request send a key variable too, containing the md5 of the salt phrase plus the rest of the URL. So the key for the above entry is md5(lego-rulespollName=time100_2009&id=1883924&rating=1).

    Without the key, or with a bad key, the vote is identifiable as fake. Even if you take the exact request made, and then spam it for 100 rating everytime, you can’t vary the rating unless you have either manually obtained the key, or could generate it.

    The article makes no mention of key-caching, nor does it mention the method for key generation, yet the program seems to offer 8 choices for values, including 3 for each of 200+ potential votes. that’s 600 keys, and without those, they can go back the day the contest ends and wipe out all the garbage votes.

    Including the ones with bad keys.
    Including the LOIC blasts, many requests, but all with blank useragents.

    I guess I’m just a bit jealous because I actually -did- reverse engineer the entire system and built a foolproof autovoter, and the brute-force machine here gets all the credit.

    • #18 by plamere on April 15, 2009 - 10:43 pm

      read the whole article. It talks about the salt and how it was found in the flash app. The URL you cite here is the URL that was used before Time tried to authenticate votes.

  10. #19 by JT on April 15, 2009 - 10:36 pm

    Disregard, I’m an asshole, and now see the hash was extracted.

    Color me retarded.

    • #20 by plamere on April 15, 2009 - 10:45 pm

      No worries

  11. #21 by anon on April 15, 2009 - 10:40 pm

    its all for the lulz

  12. #22 by anonymous on April 15, 2009 - 11:12 pm

    For cripe’s sake, all they need is a decent firewall with stateful packet inspection. Hell, I could write you a rule in Check Point’s SmartView Tracker to take care of that kind of problem in a few minutes. Drop any IP that makes a request to range x, protocol https, more than x times per x amount of time, expire after x hours.

    • #23 by anonymous on July 27, 2009 - 11:00 am

      you dumbass. this could easily block legitimate traffic. web pages often require numerous hits in rapid succession for things like scripts, css files, and images.

      sounds like you should be working for AT&T with that kind of shit logic.

      also, it’s sad that this is called a hack. to supplement my income, i offer services to _cheat_ at online contests, mostly battle of the bands type stuff. what’s interesting is most of these shitty battle of the bands contests are way better designed than this TIME poll. They require email validation, or at the very least limit by IP (which has its own set of problems). TIME should be embarrassed. but my point was that this is cheating, not hacking. determining a GET url, or pulling a string out of a flash file is not hacking. and no hacker uses Delphi, that’s just a joke.

  13. #25 by D on April 15, 2009 - 11:15 pm

    Forget Coldplay…How about thinking about the vote manipulation next time you see a poll that says the public oh I don’t know lets say favors invading a foreign country or giving a couple billion to Goldman Sachs or … Great job on the hack and in particular thanks for making it public.

  14. #26 by Isaac Z. Schlueter on April 15, 2009 - 11:17 pm

    Paul,

    Excellent article.

    However, it seems that you either didn’t watch Contact, or didn’t pay attention to it, because you just drove a truck over one of my favorite movies.

    Ellie doesn’t find a message “embedded in the digits of pi,” as you say. She finds a message embedded in *radio waves* coming from the Vega constellation. The message is encoded in a frequency that is the numerical value of the atomic weight of Hydrogen multiplied by π. The message was coming in bursts, with each set of bursts corresponding to a number in the Fibonacci sequence.

    The idea was that intelligent beings somewhat like ourselves — not universe-creators, but simple ordinary run-of-the-mill aliens who happened to be older and more technologically advanced than us — sent a message in search for sentient beings like themselves. They sent a message that could only be interpreted and understood by intelligent life, and would be unmistakably the product of intelligent life. Using H*π and the Fibonacci sequence was a way to ensure that anyone *hearing* the message would not confuse it with a natural event.

    If there was a message to be found in π, presumably someone would have found it by now, without needing to spend so much time listening to radio static from the sky.

    • #27 by plamere on April 15, 2009 - 11:28 pm

      Isaac – I’m talking about the book, not the movie. In the book ellis asks the aliens what they wonder about. They hint to ellis about a greater race that engineered the universe. They hint that there might be messages hidden in the constants like e or pi which leads ellis to start her next search for patterns in pi. Read the book. It is really quite good.

      • #28 by PJ on April 24, 2009 - 5:20 am

        This difference is why I’m a huge fan of the book but hate the movie.
        If I recall correctly the movie ended with a conspiracy theory about tapes that had been wiped.

      • #29 by alex on April 27, 2009 - 11:49 am

        i saw the book once, maybe. does that count?

    • #30 by Flatus on April 26, 2009 - 7:14 pm

      Lrn 2 read boox. You will recognize them as bound paper documents that contain information not yet expressed in a movie, TV show, cartoon, or comic book.

      • #31 by Anonymous on April 27, 2009 - 8:58 am

        It would be really cool if there was a Blockbuster for books, where you could just rent one out for a couple of nights.

      • #32 by plamere on April 27, 2009 - 9:40 am

        Try the library

      • #33 by Larry on April 27, 2009 - 10:11 am

        Wouldn’t that be a library?

      • #34 by Jeremy Nicoll on April 27, 2009 - 10:57 am

        Ooh, you mean like a library? Yeah, it would be awesome if they began implementing those!!

      • #35 by Anon on April 27, 2009 - 6:47 pm

        You fools got trolled.

      • #36 by Jurily on April 29, 2009 - 8:13 am

        Quite fitting for an article about trolling.

    • #37 by aynone on May 27, 2009 - 7:29 pm

      cool story, bro

  15. #38 by Brian on April 15, 2009 - 11:39 pm

    I agree that Time seems to have no idea when it comes to their online poll, but maybe this just gives us an idea of how seriously they take the poll. It’s as if they said “Look at my delicious sandwich!” and, as we all struggled to find ways to steal the sandwich, Time decided it wasn’t really hungry and went bowling instead.

  16. #39 by Maritova on April 15, 2009 - 11:50 pm

    @Isaac Z. Schlueter:

    Did you read the BOOK? After all the stuff with the messages from Vega, Ellie Arroway (oh, and in the book she wasn’t the only one who went into the machine) learns during her voyage that the beings who sent the signal have also been looking for signals themselves, signals from beings in some higher plane of existence that could have encoded messages into the fundamental constants and numbers of the Universe itself.

    When Ellie (and the others) return, people don’t believe their story, and they’re forced to keep quiet by blackmail. But in secret they do their own studies and eventually find messages encoded in pi itself, giving them the evidence they need to reveal to the world what they had seen and that they didn’t just imagine it all.

    This whole section at the end offers a more optimistic ending, I think, but it was cut from the movie because it was felt that moviegoing audiences wouldn’t get it.

    So yeah, Paul didn’t misinterpret the movie — you should read the book.

  17. #40 by Sam Lowry on April 16, 2009 - 12:08 am

    There is no need to waste time and money developing such applications. More powerful poll managers are always available – they are called editors, and they are humans.

  18. #41 by Anon on April 16, 2009 - 12:23 am

    Moot has the best soup, therefore he is King of Time

  19. #42 by just goes to show on April 16, 2009 - 12:49 am

    Anything is possible with zombocom.

  20. #43 by John on April 16, 2009 - 12:53 am

    Hilarious! I wonder how Time will react in their Person of the Year issue.

  21. #44 by AnonymousOrWhatever on April 16, 2009 - 1:42 am

    Marblecake rules. We are amused.
    Thank you for a very informative and fascinating article. You’ve solved a mystery for me.
    I am, however, a little annoyed. You could have protected us all by simply mentioning the acrostic of Marblecake. Thanks to you, I’ve just lost the game.

  22. #45 by Somebosy on April 16, 2009 - 4:09 am

    Sagan seduced a lot of people with his “Alien” crap.

    • #46 by Anonymous on April 28, 2010 - 7:15 pm

      well then I am glad to have been one of those people. Sagan has been and will be one of my idols.

  23. #47 by Ward on April 16, 2009 - 7:16 am

    This whole thing reminds me of a brilliant Sportsnight episode.

  24. #48 by creaothceann on April 16, 2009 - 7:53 am

    >Mooter is a dephi app (windows only)

    I think you mean Delphi

    • #49 by plamere on April 16, 2009 - 8:10 am

      @creaothceann – yup, thanks. will fix.

  25. #50 by brabantia on April 16, 2009 - 8:24 am

    Super Journalism, brilliant hack!

  26. #51 by Craig on April 16, 2009 - 8:58 am

    @ Ward:

    Agreed! Joshua Malina was awesome in that, and everything else he’s been in…

  27. #52 by John on April 16, 2009 - 9:28 am

    200 lines of perl for the lulz and the support to millions.

    4chan really does own the internet.

  28. #53 by p on April 16, 2009 - 10:10 am

    this is all cool except i can’t understand how you could possibly require anywhere near 200 lines to write them perl scripts~!

  29. #54 by jacky chan on April 16, 2009 - 10:43 am

    precision hack indeed, up to the finest details, the bios of each person choosen to be in the list is very interesting :)

  30. #55 by pruneau on April 16, 2009 - 10:49 am

    > @ plamere Says:
    > April 15, 2009 at 4:59 pm
    >
    >@pruneau – this relates directly to the music machinery >business. If a poll run by a large media company (that should >know how to run a poll) is so easily hacked, and with such >finesse (…)

    I stand corrected. And thank you for taking your time to do and write about such an investigation.

    But really, from my point of view (i.e. someone with some experience configuring networks and/or securing device and/or developping network software), the polling company did _NOT_ do due diligence.

    The simple fact that someone using the same IPv6 source address can still do more than x votes per second shoot their whole “security” system downs right there.

    They should review this, and appraise the fact that today internet is not a nice place by any means, or just admit that their polls can be rigged and be done with it. And use the results accordingly.

    What makes this particular case special is that the rigging was done with neither malign, nor stealth intentions: it’s obvious for everybody to see.

    Thanks and kudos to the “acrostic” hacker group for teaching us a valuable lesson in security. I hope the poll company gets it, tough.

    • #56 by plamere on April 16, 2009 - 10:58 am

      @pruneau – the fact that the company that messed up so royally happens to be one of the largest media companies in the world is predictive of the type security we are likely to encounter at many other online companies. For most, I suspect that security is an afterthought. We are increasingly relying on social systems to help us pick our music, our tv, our news, our political candidates. The fact that they are so vulnerable to hacking has potentially large impact on our lives.

  31. #57 by Clemens on April 16, 2009 - 12:34 pm

    Lesson: Whoever puts any weight in internet polls is a retard ^_^

  32. #58 by pruneau on April 16, 2009 - 12:46 pm

    Well, I fear you are right, but I hope you can be proved wrong.

    One thing is sure, though: if they intent to base business on those polls, they will try and invest a bit more in security.

    I know I’m daydreaming, but hey…

  33. #59 by Pandian on April 16, 2009 - 12:56 pm

    that’s cool…

  34. #60 by GBM on April 16, 2009 - 1:03 pm

    This is utterly artistic. While I certianly would not have voted for moot before this, I will be doing so now. Repeatedly.

  35. #61 by Tahko Tetsujin on April 16, 2009 - 1:05 pm

    Nice article. I wish people wouldn’t discredit all of Anonymous and do stuff like this. I mean it’s funny and all but it just gives people another reason to give us all grief.

    http://www.pushthenet.com

  36. #62 by xhurricane on April 16, 2009 - 1:38 pm

    I think after the past couple of years TIME.com doesn’t really care who spends thousands of hours and leverages hundreds of fan sites to manipulate the poll. It’s not represented as a scientific undertaking and they are attempting good journalism while idle hands play around with their toys. Incidentally, NASA’s poll was recently hacked in the very same way and probably for the very same reason.

    Lastly, TIME.com probably doesn’t have a vested interest in canceling those bot votes – since they are now counting that as user activity and will be able to justify higher ad rates to their adverts. Maybe, just maybe, TIME.com got the upper hand in this one and leveraged the power of the rabid fans to artificially increase their value!

  37. #63 by q on April 16, 2009 - 2:57 pm

    The meek shall NOT inherit the earth.

    • #64 by Anon on April 29, 2009 - 1:20 am

      The moot shall inherit the earth.

  38. #65 by Paige on April 16, 2009 - 5:51 pm

    Wow, I am so far from techie, but that was interesting – and maybe slightly frightening. But, yeah, definitely fascinating. A whole ‘nother world that we’re all connected to – whether we know it or not. Thanks!

  39. #66 by Paige on April 16, 2009 - 5:56 pm

    Oh, I guess this means that I just “lost the game”. Am I right? I just looked it up. Woa, one step closer to that mystifying technological universe. ;)

    • #67 by carlkridler on April 28, 2009 - 8:21 pm

      There are alot of interresting things in here that people are saying that are really interresting facts.

  40. #68 by yourtruevoice on April 16, 2009 - 6:05 pm

    …so we needed proof with this level of intricacy to show “fixing”? weren’t the continually abysmal results of said “polls” sufficient data to convict? but many thanks for this cool article any way!

  41. #69 by Uncramming on April 16, 2009 - 7:20 pm

    I knew who dunnit the minute I saw it. Nice.

  42. #70 by Anon, a moose on April 16, 2009 - 9:06 pm

    Pi is irrational. The digits are non-terminating, non-repeating. Therefore, all messages inevitably exist inside pi if you’re willing to search far enough.

    But I haven’t RTFB, I’m just being an ass.

    • #71 by Anonymous on April 29, 2009 - 11:41 pm

      Actually, we don’t know if every digit is in pi. Just because it’s irrational doesn’t mean it’s normal. You see, a normal number is one in which every digit has a uniform distribution. There doesn’t exist a proof that pi is normal. (For that matter, neither is there a proof for euler’s number) Therefore, seeing such a message (by itself) doesn’t mean anything but it can lead supporting evidence to a conclusion that a greater power was manipulating certain things.

      I have no idea whether the book goes over normal numbers, though, as I haven’t read it either.

  43. #72 by udtlearner on April 16, 2009 - 11:39 pm

    HAHA!Constants are easy too manipulate man…The differences of darkness and light!Your evolutionism is
    destroying your mind…

  44. #73 by Anonymous on April 17, 2009 - 3:43 am

    /b/ = internet superheroes

  45. #74 by Chris on April 17, 2009 - 6:53 am

    So why do they do it? Why do they write code, build complex applications, publish graphs – why do they organize a team that is more effective than most startup companies? Says Zombocom: “For the lulz”.

    Epic!

  46. #75 by Robert Carnegie on April 17, 2009 - 7:26 am

    I’m not sure that the calculation of pi contains all messages (like the infinite number of monkeys at typewriters generating the complete works of Shakespeare ({B Newhart, [Infinite Proceedings]}), but pi can’t be altered even by God (who in the bible didn’t even work it out to the nearest unit: 10 cubits x pi = 30). I know that Carl Sagan as author wanted to throw a little cosmic easter-egg to his abused heroine, who had just had the alien equivalent of the e-mail from Nigeria (aka “The Spanish Prisoner”), but I’m sorry that he chose that one. I would rather have had a straight line of pulsars in the sky signalling HANG IN THERE JODIE.

    Alternatively, he could have left the question open for a little longer of whether all along she really -was- in a state of schizophrenic delusion. Most people who receive alien messages are.

    Incidentally, there’s a Star Trek book where there are supercomputers whose data processing power is underestimated around 99 per cent because they spend most of the time goofing off, and for fun they have calculated that pi does finish up as a repeating decimal. But it’s a throwaway joke line. I can’t produce the proof that pi is not a fraction (a rational number), which is what a repeating number is, but I trust the people who can.

    I can nearly imagine a universe whose physical rules are so different that although pi exists it is not significant, and the measurement of configurations is dominated by the constant called zelda, which I probably just invented. that is as close as I would contemplate to changing the actual value of pi. Also, the decimal (digits 0 to 9) expression of pi probably partly depends on the fact that we have ten “digits” on our hands, whereas other critters don’t (Yakuza). But that is a variable that does not allow for much expression. Actually, pi calculates really nicely in hexadecimal, and I think that serious pi nuts use that.

    The decimal value of another “irrational” maths number, e, starts off with,

    2.71828 18284 59045 23536…

    Look at the hundredths to hundred-thousandths digits. And look at the millionths to the billionths. Now how about that?

  47. #76 by HO on April 17, 2009 - 9:54 am

    Peole are still using the web to do good things for poeple and companies. do take a look at http://cbt20.org.

  48. #77 by HO on April 17, 2009 - 9:54 am

  49. #78 by Pip on April 17, 2009 - 9:56 am

    And again the mainstream media misses every relevant point. And a blogger has to do the work. Time Warner will learn a lesson from this, but not the lesson they need, because they won’t ever read this article and take meaning from it.

  50. #79 by cpharry2 on April 17, 2009 - 10:46 am

    whatever geeks

  51. #80 by gerard pawling on April 17, 2009 - 7:43 pm

    best album of ALL time — led zeppelin “EAT THE PEACH”

  52. #81 by xt0rt on April 18, 2009 - 12:49 am

    marblecake will never die, even without its leaDARR

  53. #82 by Anon on April 18, 2009 - 4:53 am

    HACKERS ON STEROIDS

  54. #83 by Otakore Literantadodist on April 19, 2009 - 8:59 am

    Cool. Very interesting article. I am not aware TIME.com was hacked.

  55. #84 by soliloquise on April 19, 2009 - 2:13 pm

    amazing stuff.. congrats to the 4chan team for their ingenuity and brilliance ! this made me lulz
    :D

  56. #85 by Vladimir on April 20, 2009 - 2:55 pm

    Society needs people like Zombocom to show us unreliability of big media companies.

  57. #86 by Dave on April 21, 2009 - 9:29 am

    I used actually work for a subsidiary of Time and I was at least partly responsible for making sure that there were no glaring security holes in the code that was written before it went live.

    One of the biggest problems was that there wasn’t enough buy-in from management in this regard and hence the ratio of developers to security auditors was far too high. It simply wasn’t possible to read every line of code manually so we used automated tools and random sampling. Clearly, this leaves some room for improvement. Automated tools can pick up a lot but will always miss some things that a competent auditor will see.

    Another problem was the quick turnaround required on some code. For instance, the poll can be announced in the magazine or even on the website by the editors and no mention of this made to the developers until a couple of days before it is due to go live. This shouldn’t happen, but it does and because the developers pull an all-nighter to get it up and running, the editors never have to take the blame for it not working. Hence, no incentive to modify their behaviour.

    The last problem I will mention here was the varying nature of the developers. Some had good security coding practices and others didn’t. Team managers should have been fixing this when auditing code but, as I said earlier, not enough auditing was done.

    I believe things have improved a little in the department where I worked but obviously the problem is not a solved one just yet. From my observations at other places I have worked and/or audited, these problems are not unique to Time.

  58. #87 by ghjost on April 22, 2009 - 1:13 pm

    dammit, i lost the game again! thanks a lot, anon. sheesh.

  59. #88 by gerard pawling on April 24, 2009 - 11:34 am

    BEST rock album of ALL time = “EAT THE PEACH” by the led zepplien

  60. #89 by Anonymous Coward on April 27, 2009 - 8:43 am

    News flash: 200 lines of Perl and a little report generation is not a “complex application”, it’s light entertainment.

    I take that back. Maybe for the idiots at Time it’s a complex application, but that’s the problem, isn’t it?

  61. #90 by chaddd on April 27, 2009 - 10:27 am

    awesome

  62. #91 by Jeremy Nicoll on April 27, 2009 - 11:00 am

    For those who think this is just an odd case out: I do web development professionally. I spend a lot of time trying to convince clients to pay for security features and I get denied a lot. They think that no one is going to ever hack their application. It’s a bit disconcerting.

  63. #92 by Anonymous on April 27, 2009 - 4:19 pm

    Well played good sir

  64. #93 by anon on April 27, 2009 - 5:12 pm

    RULES 1 AND 2

  65. #94 by anon on April 27, 2009 - 6:09 pm

    does this really qualify as hacking?

    the article says the first draft allowed you to revisit a url to cast a vote.

    the final draft had “the salt” hard coded in the flash swf file, which there are many descriptors for.

    unless I or the article missed something, they didn’t do any more “hacking” than the average joe who puts up an unreachable score on a flash web game scoreboard. There are many ways to secure a poll better than this.

    frankly I’m a little surprised they went into depth of writing a few if else statements to spell something out in the poll… I think the real surprise is that Time 100 didn’t use any real security, even after noticing a threat.

    • #95 by plamere on April 27, 2009 - 8:23 pm

      I think you need to read the whole article

    • #96 by anonymous on July 27, 2009 - 11:12 am

      amen. this isn’t hacking. they cheated an online poll using some really simple techniques. flash decompilers are a dime a dozen, and the string “lego-rules” or whatever it was would stick out like a sore thumb. writing a gui in delphi with fancy plots just drives home that this was a fun little poll manipulation (something the /b/ guys seem to do a lot of), not a sophisticated, or even unsophisticated hack. they just have too much time on their hands (and i’m jealous) and they command a really large flock of sheep.

  66. #97 by ak on April 27, 2009 - 7:09 pm

    interesting,although I’ve just lost the game.

  67. #98 by Rodent on April 27, 2009 - 7:12 pm

    Oh Internet, how much do I love you.

  68. #99 by Anomnomnomymous on April 27, 2009 - 7:52 pm

    NOW EVERYONE KNOWS THE HORRIBLE, HORRIBLE SECRET

  69. #100 by wut? on April 27, 2009 - 8:32 pm

    Could you you please ask Time.com to comment on this story? They have just announced that moot is the winner while denying any tomfoolery and not mentioning the ‘marblecake’ business at all. I find it hard to believe they dont know anything about this; its at least shoddy journalism and at worst blatant lies. Wheres their integrity? SOMEBODY please expose them.

  70. #101 by Carl D on April 27, 2009 - 9:41 pm

    Britney Spears fans have been doing this for years.

    Her fans hacked the MTV VMA and MTV Europe Award polls in 2008 (unfairly beating Leona Lewis in each instance).

    MTV bosses proceeded with both shows, as if nothing had happened. The Brit Awards have also been targeted in the past.

    The only person to beat Britney Spears is Rick Astley, whose fans casted over one billion votes (not a typo) using the “rickvoter”.

    MTV has no integrity, and probably enjoy millions of bots hitting their website, which they pass off to advertisers as genuine traffic. A complete and utter sham, for which they have never apologized.

  71. #102 by Le Rev Dr on April 27, 2009 - 9:50 pm

    Ironically, Parishioners,

    I just lost The Game…

    Blessings,

    Le Rev Dr

  72. #103 by Carl D on April 27, 2009 - 9:52 pm

    Avril Lavine fans also gamed YouTube, using TubeIncreaser and TubeBooster, making her song “Girlfriend” the most watched video of all time.

    The same video does not even make the top ten most favourited list (something that requires real people to favourate, and thus cannot be gamed).

    Apparently YouTube find nothing wrong with this.

    So who is making money from this scam? Does anyone care?

    • #104 by anonymous on July 27, 2009 - 11:17 am

      dude. if you actually care about this youtube stuff, or that mtv crap that you posted before, then you need to turn off the computer and tv for a couple of weeks and sort it out.

  73. #105 by Anon on April 28, 2009 - 12:15 am

    Time fails. I wonder how this will play out to the public. A magazine they read and trust has been pwned by a bunch of bored hackers.

  74. #106 by liasd on April 28, 2009 - 12:01 pm

    “for the lulz”
    how epic she would put that in the end… no thats just stupied

  75. #107 by x-org on April 28, 2009 - 2:08 pm

    “For the Lulz”

    EPIC WIN

  76. #108 by Anonymous on April 28, 2009 - 4:47 pm

    m
    A
    R
    B
    L
    E
    C
    A
    K
    E

    A
    L
    S
    O

    T
    H
    E

    G
    A
    M
    E

    We worked our butts off for this.

  77. #109 by forgetso on April 29, 2009 - 7:55 am

    “why do they organize a team that is more effective than most startup companies?”

    hahaahaha, lulz. epic

  78. #110 by xorsprite on April 29, 2009 - 10:46 am

    Interesting article. The hack is specktacular in that it is to Time mag, and lulz, but technicaly straight forward to any competant and experienced web programer who has the balls and inclination. Due to it’s hameless nature to such a powerful media organisation I admire Mr Moot.

  79. #111 by Anonymous on April 29, 2009 - 1:43 pm

    The game.

  80. #112 by Fellow Anon on April 29, 2009 - 5:40 pm

    hai guise.. just wanted to know, what is /b/?

    sincerely,
    shttngdcknppls

  81. #113 by rai on April 30, 2009 - 1:17 am

    hai

  82. #114 by shopping2malls on April 30, 2009 - 1:18 am

    Ho ! Good !

  83. #115 by alch on May 1, 2009 - 5:14 am

    Henrik Says:
    April 27, 2009 at 3:49 pm

    Honestly, I think /b/ would be able to have a bigger impact than any other kind of hacker group.
    ——————————————————–
    ROFL. /b/ tards being hackers? You know how to make jokes!

    Nothing but children and angry teenagers.

  84. #116 by Days on May 1, 2009 - 11:25 am

    This was certainly VERY interesting, and until I read the very last part ‘lulz’ this type of stuff always makes me want to learn how to script. But ‘for the lulz’! that kind of behavior is disgusting, it can hurt SO many people, just for the laughs? What happens when some teenager decides to try and hack something really important, just for the kicks? The CoS (Church of Scientology) does deserve whatever happens to it, I agree with people hacking and whatever them, but only because it is for a reason, a very good reason! For fun is almost never a good reason

  85. #117 by duuuddh on May 4, 2009 - 12:08 am

    “they didn’t have range check on the voting ”

    This really makes me think that what kind of newbie coder does Time use ?

    Or is it so that they interested 0% of security
    Hopefully this makes the security more interesting from now on

  86. #118 by statg on May 4, 2009 - 1:49 am

    weird

  87. #119 by Lulz on May 5, 2009 - 4:15 pm

    4 teh lulz!!!

  88. #120 by anonymous on May 7, 2009 - 10:51 am

    marblecake wins >9000 internets
    i lost the game..

  89. #121 by anonymous on May 8, 2009 - 12:56 am

    its all fot teh lulz

  90. #122 by Anonymous on May 12, 2009 - 4:42 pm

    newfags can’t keep their mouths shut

    also, i just lost the game

  91. #123 by Guy Forks on May 14, 2009 - 5:25 am

    Evry1 lost the game nub

  92. #124 by Chris on May 25, 2009 - 1:54 pm

    Absolutely fucking genius. A job well done.

  93. #125 by Roku Taiki on May 26, 2009 - 2:22 pm

    Beautiful. I should take lessons from them. Dad wont teach me, even though he used to be a decent hacker himself.

  94. #126 by Anon on June 8, 2009 - 2:01 am

    I just lost the game :(

  95. #127 by Anon on June 8, 2009 - 4:26 pm

    Just shows how sad these people are to wreck Time’s poll just because they can.

    • #128 by anonymous on July 27, 2009 - 11:20 am

      sad? i’d say they’re happy as hell getting all this publicity for cheating at a stupid online poll. much happier than you by the sound of it…

  96. #129 by Batmanifestdestiny on June 11, 2009 - 3:26 pm

    LOL! Things like this make me want to try going to 4chan…now if only it wasn’t full of hentai and stuff…

  97. #130 by anon on June 11, 2009 - 4:47 pm

    wait… this is hacking? i thought hacking required way more 1337 skills than what is described above. at least thats what the movie hackers paints it out to be. i mean this is fairly simple scripting… its not like they de-rainbowed the md5 or anything crazy

    • #131 by anonymous on July 27, 2009 - 11:23 am

      i was half-expecting that’s what they’d done, but then remembered it was /b/, not people with skills. i guess running strings on a swf file is considered hacking these days…

  98. #132 by anon on June 11, 2009 - 4:49 pm

    for example:
    “Someone figured out the voting URL protocol”

    ummm thats waay easy. just use a console program like firebug

  99. #133 by Anon on June 17, 2009 - 12:11 am

    I lost

  100. #134 by mr. xyi on June 30, 2009 - 7:49 am

    look at total votes xD

  101. #135 by EPIC FAIL on July 21, 2009 - 1:18 pm

    i thought they called it world of warcraft because everyone who plays it yells WOW in excitement, so they lengthened the abbreviation to world of warcraft

  102. #136 by name on July 29, 2009 - 3:25 am

    Real,

  103. #137 by robb on August 21, 2009 - 12:45 pm

    this is hacked to the core !!!
    marblecake ftw.

  104. #138 by mikekearn on September 15, 2009 - 10:35 am

    Shit. I lost the game. Great article, though. It was good for some lulz.

  105. #139 by BloodyT on October 18, 2009 - 10:00 am

    Hacking at its core, is simple exploitation. No matter how open that exploit is.. From item duping, to draining millions of dollars from banks. Although Hackers, are known for their skills, and ability to find these exploits by applying past knowledge. Script-kiddies on the other hand, use other peoples works, in the intent they are meant for, rarely discovering un-trotted territories. They also rarely know how a particular exploit works, they just know that it does. Just because you use someone else’s tools doesn’t make you less intelligent. In fact few hackers out there actually have their own OS they coded and designed, which means few hackers can say they stand on their own 2 feet completely.

    Oh and “for the Lulz” is a great reason to do something, because if you ever need to do it again in the future, you now have the experience to make it go much smoother the second time around.

    There is nothing more dangerous than a self proclaimed genius, especially when they have all the information of the internet at their disposal

    If you believe you are to stupid to do something, you probably are.

    4chan itself is more than just a zest pool, its a breeding ground for true creativity. Thousands of people, all trying to be able to say they are the creator of something popular, while simultaneously remaining anonymous, destroying all proof that the work was ever theirs. Lets divide 4chan’s populace into 4 categories, noting people can transcend, and regress, any or all of them at times.

    NewFags – the bread and butter behind 4chan, usually without any photoshoping skills, they hang around perpetuating their favorite memes.

    Trolls – these cheeky bastards, are here on a psychological level. They lead the NewFags around like sheep. They are manipulative and controlling, taking pleasure in their ability to predict, and control others.

    OldFags – Players who consider themselves Senior members of 4chan, they have often been around for a long time, but not always. They usually have atleast moderate photomanipulation skills, and have a deeper understanding of what 4chan is about. Most of the meme’s come from this level, although some do come from the trolls.

    Underground – This would be the elite’s with varying skills, and to much time on their hands. I havnt been around long enough to know that much about this catagory, and all I know are rumors

  106. #140 by DannyDeranged on October 19, 2009 - 4:58 pm

    Haha.

    Wow.

  107. #141 by revolagima on October 25, 2009 - 11:21 pm

    You call a hacker to someone who wrote a program in DELPHI!?!? You must be KIDDING, seriously! i call that person a YOUNG boy with many free time :P

  108. #142 by da bishop on November 16, 2009 - 5:04 am

    wonder how many of the 4chan droogies know that Pascal (that’s what delphi is an implementation of) was started at…

    Apple.

    In the 80s before they got into jail & jailing.

  109. #143 by da bishop on November 16, 2009 - 5:09 am

    object pascal… that is.

    Was made for the Apple Lisa SDK & moved onto the Mac68k from there.

  110. #144 by da bishop on November 16, 2009 - 5:11 am

    Quality job of messin with Time Warner BTW. Classico.

  111. #145 by Anonymous on December 19, 2009 - 5:13 am

    I love 4chan. Also, I just lost The Game.

  112. #146 by anonymous on December 25, 2009 - 12:24 am


    ▲▲

    Also, The game.

    • #147 by anonymous on January 6, 2010 - 2:48 am

      haha newfag
       ▲
      ▲▲

  113. #148 by никто on December 30, 2009 - 9:24 am

    Referring to the whole “worrying about how serious media companies take their security” thing:

    I challenge anyone with the skill level of those who conducted this “hack” to try to extract a single dime from a system that Matters to Owners™. Seriously, the whole “manipulated by some collective” angle originating with the first post is nonsense. Anything that matters to someone on this planet, online or offline, is secured as it should be. If security seems lax it’s because nobody gives a damn about a TIME.com online poll, including TIME.com itself.

    If you ever saw a successful, real hack on a valuable target know that the perpetrators are no /b/tards and have been spending valuable time on actual technical learning rather than “trolling the internetz.” And they won’t do it “for the lulz” since they are well aware of the consequences (and yes, an actual act of “hacking” has dire consequences if one gets caught).

    In the end, this boils down to “lulz:” cheap, short-lived, insignificant, disaffected-youth-type enjoyment. Have a lollipop.

    P.S. It’s tough, rough, and cold out here. Stick to your armchairs so long as respective basement owners haven’t applied the Final Solution to your little den.

  114. #149 by tantamount on December 30, 2009 - 11:14 pm

    Has anyone considered the possibility that this whole thing was just a way to get the internet generation interested in and talking about Time magazine? Why did they put moot in the poll in the first place?

    Someone mentioned 4 categories of 4chan users, but they’re wrong. There are 2 categories: cancer and not-cancer. And considering how much child porn is on /b/ I’d say cancer wins the numbers game.

  115. #150 by Lewis on January 6, 2010 - 1:00 am

    I also lost the game. Fuck!

  116. #151 by KittyToXiC on January 23, 2010 - 3:13 pm

    I just loast the game.
    =[

  117. #152 by ??? on January 26, 2010 - 8:11 pm

    i lost the game

  118. #153 by Anon.E.Moss on January 29, 2010 - 1:45 am

    I was unsure what the game was, but I found my answer, and now I have lost.

  119. #154 by dart on February 3, 2010 - 10:12 pm

    I am impress by technical knowledge.

    I am disappoint in that this has not been done again. although I’m not sure how many polls moot would be in.
    With that being said, 4chan has been pretty dang influential.

    but srsly. hax sum srs stuff. kthnx.

    *popping popcorn*

  120. #155 by mootipoops on February 6, 2010 - 10:52 am

    NEWFAGS CAN’T TRI-TRIFORCE
          ▲
         ▲ ▲
        ▲ ▲ ▲
       ▲     ▲
      ▲ ▲   ▲ ▲
     ▲ ▲ ▲ ▲ ▲ ▲

    • #156 by Anonymous on March 9, 2010 - 5:50 pm

      You proved that point exquisitely.

  121. #157 by charles on February 12, 2010 - 10:39 pm

    Being myself a follower of Pharyngula, I can agree that the polls will go crazy. I mean really crazy weighted in one direction. But this…I cannot imagine the degree of organization that went into this. Truly fantastic.

  122. #158 by Club Penguin on February 13, 2010 - 12:36 pm

    It’s scary how much influence a group of people on a website can have. At the same time 4chan always seems to come up with a way to make us laugh

    • #159 by Anonymous on March 9, 2010 - 5:18 pm

      It’s not just us 4channers, but thankyou.
      Anon.

  123. #160 by Lavera Brodsho on February 27, 2010 - 8:03 am

    Dont You just Love this ? Its GREAT!! THE BEST!!

  124. #161 by Anonymous on March 9, 2010 - 5:16 pm

    Even now, this is still full of win.

  1. popurls.com // popular today
  2. playground : LikeItHateIt
  3. Interesting Reading… - The Blogs at HowStuffWorks
  4. For the lulz!
  5. Inside the precision hack
  6. I just lost The Game – moot owned TIME « allzutaegliches
  7. new world order « collectivise this, baby
  8. Inside the precision hack — how it was done | Altierispot
  9. We are but a crude mob | The Atheist Mind
  10. Der Time.com-Hack und wie er zustande kam | Minds Delight
  11. Inside the precision hack « Music Machinery « Fataldistraction’s Blog
  12. Time Magazine poll hack by 4chan analysis « Yuppiewax
  13. Operation Basement Dad: How 4Chan Could Beat CNN & Ashton Kutcher
  14. Operation Basement Dad: How 4Chan Could Beat CNN & Ashton Kutcher
  15. Operation Basement Dad: How 4Chan Could Beat CNN & Ashton Kutcher | Technolocus
  16. Operation Basement Dad: How 4Chan Could Beat CNN & Ashton Kutcher | Whaza.net
  17. links for 2009-04-16 « My Weblog
  18. Interests 20090416 - Adam Crowe
  19. Realitatea nu are pixeli - honeybunny’s blog » Blog Archive » Justificarea 4chan
  20. Top Posts « WordPress.com
  21. Links #4 « Mētis
  22. Techeroid » Operation Basement Dad: How 4Chan Could Beat CNN & Ashton Kutcher
  23. Typical /b/ « The Blog of Dan Driffill
  24. photomaniacal.com » Blog Archive » Spam: The Enemy of Green Technology
  25. The Time Empire Strikes Back « Music Machinery
  26. kstudio » links for 2009-04-17
  27. links for 2009-04-17 | Nerdcore
  28. piece 0 plastic - the revolution will be blogged » ruff linkage 200916
  29. The Crossed Pond » Yet Another Example of Why Online Polls Are Useless: The Precision Hack
  30. readerchick12 - Music Loving Fool…and Twitter | Austin Meetups
  31. Interessantes woanders (2009.04.21) › Immersion I/O
  32. 4Chan Takes Over The Time 100
  33. 4Chan Takes Over The Time 100 | TechBeat|Gather Tech News
  34. Techeroid » 4Chan Takes Over The Time 100
  35. Trade Jim News » 4Chan Takes Over The Time 100
  36. infoyourway.com » 4Chan Takes Over The Time 100
  37. 4Chan Takes Over The Time 100 | The Good NET Guide
  38. 4Chan、Time 100を乗っ取る
  39. Stuffing online polls with amazing results | JasonMorrison.net
  40. The Agitator » Blog Archive » Morning Links
  41. Pallian News and Linkfest
  42. Boring Monday » Blog Archive » Anwar ranked 2nd on Time.com Most Influential People?
  43. Time’s most influential list hacked | Journalism.co.uk Editors' Blog
  44. Spintank » Twitter upside down
  45. Hack na wyniki… ładny taki | mabateus
  46. Weekly Computer Security News Highlights > 20th April -- 24th April 2009
  47. Time’s most influential list hacked | DAILYMAIL.ME
  48. moot on the cover of Time Magazine?? - Page 12 - Why We Protest | Activism Forum
  49. The Beauty of Internet: 4Chan Founder Sweeps Time's Most Influential List
  50. It’s Official (and Hacked): 4chan Founder Sweeps Time’s Top 100 List | Stoth
  51. Techeroid » It’s Official (and Hacked): 4chan Founder Sweeps Time’s Top 100 List
  52. GamezBlog » It’s Official (and Hacked): 4chan Founder Sweeps Time’s Top 100 List
  53. infoyourway.com » It’s Official (and Hacked): 4chan Founder Sweeps Time’s Top 100 List
  54. macoute.suursavo.org » Blog Archive » Timen äänestysfarssi
  55. A pretty credible poll! » the new dooz
  56. Time Magazine names 4chan founder as the most influential person in the world. - The Next Web
  57. TechTerminal » It’s Official (and Hacked): 4chan Founder Sweeps Time’s Top 100 List
  58. The world's most influential person is ... Wtf - Fires of Heaven Guild Message Board
  59. 4Chan Manipulats Time: “Top 100 Most Influential People” | Jordan's Technology Blog
  60. ECTOPLASMOSIS! » Hackers Are Time’s Person Of The Year
  61. TIME 100: Wer regiert das Internet? | Blogpiloten.de - das Beste aus Blogs, Videos, Musik und Web 2.0
  62. Trade Jim News » Moot, 4chan Founder, Takes Time 100 Poll
  63. Sinners in the Hands of an Angry Blog
  64. TIME MAGAZINE FUCKED UP « You Fucked Up
  65. Icma2002.Com » Blog Archive » Moot, 4chan Founder, Takes Time 100 Poll
  66. Moot is the world’s most influential person according to Time Magazine - The Blogs at HowStuffWorks
  67. Gene Likes It… » Blog Archive » A beautiful hack
  68. 秋元 » 4chan.orgがTime Magazineに盛大な田代砲を発射
  69. Daily We Are Many: Precision Hacking for the Lulz | We Are Many
  70. [News] And the Times World's Most Influential Person Is... - FunEnclave
  71. The Zousware Cabal » Blog Archive » Most influential indeed.
  72. Time's 100 most influential list hacked by 4chan /b/ - Order of the Blue Gartr
  73. For the lulz | IdentidadGeek
  74. Vincent Gable » Don’t Trust TIME
  75. Because the only rule that matters, is Rule 34 - Xaotik Designs
  76. There but for the grace of God « Entitled to an Opinion
  77. The Question is Moot: 4chan Hacks Time 100 List | Blippitt
  78. moot wins, Time Inc. loses « Music Machinery
  79. Funny, Strange, Random Pics - Page 2286 - Fires of Heaven Guild Message Board
  80. Moot, 4chan Founder, Takes Time 100 Poll | Finley & Cook, PLLC
  81. Kurogane’s Anime Blog » The World’s Most Influential Person according to TIME Magazine.
  82. Believers - is Satan behind the Atheist's Viewpoint? - Page 52 - Christian Forums
  83. An eclectic's guide to TeakDoor - TeakDoor.com - The Thailand Forum
  84. 絶望した! « Thousand Memories
  85. Rambling: bleeding eyes, evilution, and []lingualisms « udg
  86. World’s most ‘Influential hacker’! | Hacked Info
  87. The World's Most Influential Person is.... - SVTPerformance
  88. IT PRO: Blogs: Davey Winder: How Marblecake Hacked Time
  89. Dear Time Magazine: Know when you’re pwned | project-elite.net
  90. Inside the precision hack
  91. photomaniacal.com » Blog Archive » Time’s World’s Most Influential Person is a Moot Point
  92. Time's most influential. - Nubblies.net Forums - Wtf Did You Google To End Up Here?
  93. /b/ - VR-Zone IT & Lifestyle Forum!
  94. Post what you're thinking about right now... - Page 130 - voogru.com - Online Gaming Community
  95. Time's Most Influential Person of the Year??? - Page 3
  96. The Transhuman Future is Yesterday | Hume's Other Fork
  97. Huh.... - mcarterbrown.com
  98. Time Magazine - Marble Cake Also The Game » F!XMBR
  99. How did moot become Times #1 Influential person? | G.A.M.E.S.
  100. Time.com precisionshackat! » Teflonminne
  101. Time.com Declares Your Opinion moot « Fancy Plans… and Pants to Match
  102. La persona más influyente del mundo según TIME es ¿moot? : Blogografia
  103. Official bored at work / just shooting the shit / no rails to derail thread - Page 312
  104. Time’s World’s Most Influential Person is a Moot Point - SoundSolutionSam1
  105. La persona más influyente del mundo según TIME es ¿moot? « powerx7
  106. Live Is A Game: Die Top 100 der TIME wurden gehackt » gamgea.com
  107. JMI7.RU » Хакеры превратили рейтинг Time в акростих
  108. Sociala Gerillan
  109. Time Magazines Most Influential List - Was Hacked!! | Allie Is Wired!
  110. EPIC WIN OR FAIL: Time Magazine Names 4Chan Founder Moot As Most Influential Person | Guilda Blog
  111. Here we go again: Pocket God "offensive" - MacTalk Forums
  112. Time’s World’s Most Influential Person is a Moot Point @ Wi Life System-All Technology Information
  113. Time y encuestas sobre las personas influyentes: resultado MOOT (Hacker de 21 años. « Emira TV
  114. The Top 10 Lists makes the news! | SD | On any topic under the sun |
  115. 小隔間裡的人生
  116. TIME magazine's "world's most influential person" - Page 3 - ARG! Teen Forums
  117. Hackers manipulam votação online da Time « Diálogos Políticos
  118. The dangers of asking the Internet « Blog Fiasco
  119. The most influential person on the planet is… Christopher Poole | PolBay Webcenter Blog
  120. 100 บุคคลทรงอิทธิพลของโลกปี 2009 - Time | Pantip Guide
  121. 2009 Februar | Jeder darf Bloggen
  122. Oprah, Maya, Maya, Oprah | Good Clef
  123. TIME's most influential list released (and apparently hacked) | College Jolt
  124. Music News, IOmusic.net » Oprah, Maya, Maya, Oprah
  125. The World’s Most Influential Person according to TIME Magazine. | Anime
  126. I was aiming for my foot, but I seem to have shot myself in the thigh… « Scenarios and Strategy
  127. Twitter as a marketing tool (or why I had to unfollow Tim O’Reilly) « My Blog
  128. Oprah, Maya, Maya, Oprah | Beautiful Lie - Music & Beyond
  129. Marshmallow Ladyboy Jesus » Jesus recommends: Direct Democracy
  130. Precision Hacking - Freakonomics Blog - NYTimes.com
  131. Hack the Vote - Southern Maryland Community Forums
  132. The Shill Machine « Music Machinery
  133. Infos zum 4Chan-Time-Hack « startafire
  134. Internet Wars – Episode 1: 4Chan vs AT&T « Adventures in Reality
  135. Network Security Blog » Don’t poke a hornet’s nest
  136. Aunque ya pasó: La historia secreta detrás del Time’s 100 Most Influential Person 2009 « Panoramic
  137. Bob Mottram (motters) 's status on Thursday, 17-Sep-09 14:12:28 UTC - Identi.ca
  138. The Narwhal » Another Useless Time.com Poll
  139. The Daily Mail to stop moderating comments, so how should they display comments?
  140. Google, reCAPTCHA и FastFlip
  141. E-Voting und weitere Anwendungen homomorpher Verschlüsselung
  142. Hacker? « Bartleby's Dismay
  143. Another Sign I’m Getting Older « The Daily Ping
  144. GameTree » Blog Archive » Polls, Damn Polls, and Poker Botting
  145. Proof: Jakim Creates Online Poll on Caning Controversy, then Cheats with the Results « tim thinks that***
  146. En synd att journalister inte granskar opinionsmätningar « Viktor Tullgren
  147. Supreme Lulz [Poll Results] | Top Blogs News
  148. Internetz on internet » Pitkähassukissa
Follow

Get every new post delivered to your Inbox.

Join 998 other followers

%d bloggers like this: