<table cellspacing="0" cellpadding="0" border="0" ><tr><td valign="top" style="font: inherit;">wow, this is fascinating.&nbsp; never seen anything like this done before.<br><br>--- On <b>Sun, 8/7/11, Jake <i>&lt;jake@spaz.org&gt;</i></b> wrote:<br><blockquote style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"><br>From: Jake &lt;jake@spaz.org&gt;<br>Subject: Re: [Noisebridge-discuss] antisec releases 10gb of law enforcement data<br>To: "noisebridge-discuss@lists.noisebridge.net" &lt;noisebridge-discuss@lists.noisebridge.net&gt;<br>Date: Sunday, August 7, 2011, 1:46 AM<br><br><div class="plainMail">follow the piratebay link and click "browse the leak" they posted their <br>full hacklog, you could learn a lot from that.<br><br><a href="http://thepiratebay.org/torrent/6587214" target="_blank">http://thepiratebay.org/torrent/6587214</a><br><br><a
 href="http://mobile.pcmag.com/device2/article.php?CALL_URL=http://www.pcmag.com/article2/0,2817,2390582,00.asp" target="_blank">http://mobile.pcmag.com/device2/article.php?CALL_URL=http://www.pcmag.com/article2/0,2817,2390582,00.asp</a><br>&gt;&gt;&gt;<br>&gt;&gt;&gt; any idea where to get this data treasure trove?<br>&gt;&gt;<br>&gt;&gt; A lot of people post leak URLs on twitter. &nbsp;You could look there.<br>&gt;&gt; Pick a random hacker and check their followee list.</div><br>-----Inline Attachment Follows-----<br><br><div class="plainMail">_______________________________________________<br>Noisebridge-discuss mailing list<br><a ymailto="mailto:Noisebridge-discuss@lists.noisebridge.net" href="/mc/compose?to=Noisebridge-discuss@lists.noisebridge.net">Noisebridge-discuss@lists.noisebridge.net</a><br><a href="https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss"
 target="_blank">https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss</a><br></div></blockquote></td></tr></table>