Guest Posting

If you wish to write and/or publish an article on Operation Disclosure all you need to do is send your entry to UniversalOm432Hz@gmail.com applying these following rules.


The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

News Alerts

RV/INTELLIGENCE ALERT - February 17, 2018


The Cabal agents who attempted to open up a portal with CERN have escaped.


During their escape, they managed to steal a private jet used by White Hats.


The Alliance is currently tracking them down in Idaho.


Indications suggests they are held up at an old observation post (that has not been in service since the 1950's) and are attempting to contact remnants of the Dark Fleet.


Rogue Cabal elements have contacted the local CIA station chief to protect these agents.


Alliance Ghost Operatives have been deployed to deal with the situation.


Stay tuned for further developments.


The Alliance are currently contacting the Galactics for a plan of action to completely eliminate the Cabal once and for all.


In the mean time, the RV will be on hold until then.


The Alliance's goal is to begin the transition event this month.


---


FOR MORE INFORMATION ABOUT THE RV/GCR VISIT:


http://www.dinarchronicles.com/intel.html


---

Featured Post

Restored Republic via a GCR as of Feb. 18, 2018

Restored Republic via a GCR Update as of Feb. 18 2018 Compiled 12:01 am EDT 18 Feb. 2018 by Judy Byington, MSW, LCSW, ret, CEO, Child Abus...

Wednesday, February 3, 2016

Warning When Using eBay, Malware being Distributed

eBay has no plans to fix "severe" bug that allows malware distribution

Posted By: MrFusion [Send E-Mail]
Date: Wednesday, 3-Feb-2016 13:41:44


Be suspicious of unexpected pop-ups on eBay while viewing item listings...

~~~~~~~~~~~~~~~~~~~~~~

eBay has no plans to fix “severe” bug that allows malware distribution [Updated]
Clever "JSF**K" technique allows hackers to bypass eBay block of JavaScript.
by Dan Goodin - Feb 3, 2016

eBay has no plans to fix a "severe" vulnerability that allows attackers to use the company's trusted website to distribute malicious code and phishing pages, researchers from security firm Check Point Software said.

The vulnerability allows attackers to bypass a key restriction that prevents user posts from hosting JavaScript code that gets executed on end-user devices. eBay has long enforced the limitation to prevent scammers from creating auction pages that execute dangerous code or content when they're viewed by unsuspecting users. Using a highly specialized coding technique known as JSF..K, hackers can work around this safeguard. The technique allows eBay users to insert JavaScript into their posts that will call a variety of different payloads that can be tailored to the specific browser and device of the visitor.

"An attacker could target eBay users by sending them a legitimate page that contains malicious code," Check Point researcher Oded Vanunu wrote in a blog post published Tuesday. "Customers can be tricked into opening the page, and the code will then be executed by the user's browser or mobile app, leading to multiple ominous scenarios that range from phishing to binary download."

~~~~~ CONTINUE AT: ~~~~~

http://arstechnica.com/security/2016/02/ebay-has-no-plans-to-fix-se...

Receive News from Operation Disclosure via Email

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.