One of the foundations of our legal system is that doing something “in a good cause” doesn’t protect you from the consequences of criminal activity. And as much as I agree with the motivations here, this is still “unauthorized access to a protected computer” under current US law.
PARLER GOT FUCKING OWNED BAD...and I mean BAD 😂 "This group of Internet Warriors then used that account, to create a handful of other ADMINISTRATION accounts, and then created a script that ended up creating MILLIONS of fake administration accounts." HOLY SHIT HAHAHA 😂🤣
2
2
12
I’m also interested in the legal implications of this data. Can illegally obtained data that is then dumped on archive.org be used in criminal or civil trial, or is this mess all poisoned? Any legal experts willing to weigh in here?

Jan 11, 2021 · 10:49 AM UTC

8
2
3
Earlier post circulating about Parler data being obtained via security vuln may have been a false flag. Archivists say they just used Parler’s API along with the fact that stored content used sequential URLs. mashable.com/article/parler-…
2
Replying to @hal_pomeranz
I was wondering this too. I also thought I saw a post stating that they provided the data to the FBI which seems like it might taint it. I have also seen other posts claiming this is all BS and that Parler provided the data in response to a subpeona
1
I would believe that the FBI has preservation orders in place with both Parler and AWS and is working on warrants to get their own copies of this data through proper legal means.
Replying to @hal_pomeranz
depends on if you can convince the judge to admit it. Tho is “here’s a copy I found on a second site” a precedent that we want to set for evidence? (even if archive.org is a trusted site)
Replying to @hal_pomeranz
also, does a social media post even need to pass chain of custody rules? Unless content is collected from the back-end (by subpoening the platform itself) can you say with **certainty** who posted what? Or that an image isn’t modified?
1
Replying to @hal_pomeranz
(most platforms do mod images, scrub metadata, anti stego mods and so on)
Replying to @hal_pomeranz
THIS is a talk I would tune into - would this data be considered fruit of the poisonous tree?
Replying to @hal_pomeranz
And using this as a baseline to start parallel reconstruction - would that be a terrible idea? Or did the hacktivists just essentially do more harm than good here.