Jump to content
The World News Media

Watchtower Pirates?


Matthew9969

Recommended Posts

  • Member

My jw mom downloaded jw.org, and since then she has had nothing but problems.  Her password changes all the time, even though she never changed her password, but jw.org tells her she needs to change her password just to get into her computer. My brother and I are jumping through hoops to get her reconnected via loop. Has the governing body  found a way to hijack people...they do after all pay millions to lawyers, why not IT techs. Is my jw mom a victim of WTBTS? And they are asking for donations. Or do you know if someone is using the jw website to con people?

Link to comment
Share on other sites


  • Views 363
  • Replies 8
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Popular Posts

It is very confusing, and I think it may be a work in progress. There would be no need for passwords were it not for people like on this forum, who will not behave and who will ‘zoombomb’ or otherwise

Uuuummmmm, I thought that was the point?

My jw mom downloaded jw.org, and since then she has had nothing but problems.  Her password changes all the time, even though she never changed her password, but jw.org tells her she needs to change h

Posted Images

  • Member
38 minutes ago, Matthew9969 said:

My jw mom downloaded jw.org, and since then she has had nothing but problems.  Her password changes all the time, even though she never changed her password, but jw.org tells her she needs to change her password just to get into her computer. My brother and I are jumping through hoops to get her reconnected via loop. Has the governing body  found a way to hijack people...they do after all pay millions to lawyers, why not IT techs. Is my jw mom a victim of WTBTS? And they are asking for donations. Or do you know if someone is using the jw website to con people?

It is very confusing, and I think it may be a work in progress. There would be no need for passwords were it not for people like on this forum, who will not behave and who will ‘zoombomb’ or otherwise cause chaos given the first opportunity. Trolls have got to be among the most odious things on the planet, necessitating layers of security in many organizations because they simply will not behave.

It drove me nuts, too, at first attempt. At present, so far as I know, you cannot stream the assemblies from the jw app that suggests you can. Again, I think it is a work in progress. Tell her to contact her elders. They will be able to get her in without fuss. Other online meetings are hosted and the host will not let in anyone unrecognized. Easy to set up in advance, however, to avoid problems. I am not sure whether you could do it for her or not. If you told the elders what jerks they were as you departed, and how you run them all down of the WNMF, they might not believe your good intentions now.

They have to guard against determined opposers, not all of whom are stupid. It is roughly the equivalent of how in times of ban, the brothers are very careful in screening people, since liars come around feigning interest when their real goal is to make it hot for the brothers. In the meantime, the jw.org website is freely open to all, with tons of videos and talks.

Passwords in general are a nightmare, triggering constant aggravation. It may be one of those situations where it is observed, “If everyone was a Witness, there would be no need for locks—theft would be so rare that most could do without.” Same with passwords, I suspect. They may not be completely unnecessary, because people are people, but probably a 4 digit one across all accounts would serve just fine.

Link to comment
Share on other sites

  • Member

I hate all passwords and often have to reset them.... and forget them.. and reset them.  Moving and changing of phone numbers does not help.  And I do sometimes struggle to get into some of my important accounts..... very frustrating for an A-type personality.  I guess this is the price we have to pay because we live in a society where theft, pornography, child trafficking, phishing etc is the order of the day.

Yes, one of the parts on our recent mid-week meeting informed us of the consolidation of the app and our website. It is an ongoing process.

Link to comment
Share on other sites

  • Member
On 5/9/2020 at 8:58 PM, TrueTomHarley said:

Trolls have got to be among the most odious things on the planet, necessitating layers of security in many organizations because they simply will not behave.

Jim began an online Bible study with #Jehovahs Witnesses, intrigued by answers to

Why is there suffering
What happens when we die
What is the purpose of life
How to cope with adversity

A troll appeared from nowhere to harass him, with lizard-like demeanor and tiny brain to match. Of course, Jim was not intimidated, but what a pest that troll was.

image.gif

Link to comment
Share on other sites

  • 2 weeks later...
  • Member
On 5/12/2020 at 9:33 AM, TrueTomHarley said:

A troll appeared from nowhere to harass him, with lizard-like demeanor and tiny brain to match. Of course, Jim was not intimidated, but what a pest that troll was.

image.gif

Tom, I'm a little disappointed. I thought this was specifically designed for me..........only to find that you've given this gem to someone else in the thread "overlooked by the Religion news service-how can this be?". Can I request that you devise original insults and name calling when insinuating things about me. I think it's too hard to take you seriously when you send generic jabs and make them universal among your foes.    

Link to comment
Share on other sites

  • Member

I came across the GIF recently in yet another context and I delight in how many areas it applies. Give me a break. When a man discovers GIFs it is “like a mighty man emerging from the bridal chamber.” (Ps 19:5)

A few years ago it was hashtags. “They’re call hashtags, Dad, not crosstags,” my daughter told me.

Link to comment
Share on other sites

  • Member

If it helps, Shiiiwiiiiii was not a specific target—I had someone else in mind.  I am just enthralled with the GIF. I mean, C’mon! It’s perfect! Niggling little taunts from the lizard. Captain stared it down and then firmly shoves back. But that does not stop another pesky little poke from the lizard—who never gives up.

Strictly speaking, adding the detail of the ‘tiny brain’ is not necessary. But it would fit for a lizard. It would also fit for a troll who makes it his career to continually show up on an ostensibly Witness site to launch incessant attacks.

IMG_5900.MP4

Link to comment
Share on other sites

  • Member
On 5/9/2020 at 7:46 PM, Matthew9969 said:

My jw mom downloaded jw.org, and since then she has had nothing but problems.  Her password changes all the time, even though she never changed her password, but jw.org tells her she needs to change her password just to get into her computer. My brother and I are jumping through hoops to get her reconnected via loop. Has the governing body  found a way to hijack people...they do after all pay millions to lawyers, why not IT techs. Is my jw mom a victim of WTBTS? And they are asking for donations. Or do you know if someone is using the jw website to con people?

Something is a bit off. All points color coded with your comment.

[1] Downloading an application doesn't enable one to use a login/password unless the protocols are in place to do so, hence if she is using that application that all JWs are using, it does not enable, from what I can see, such protocols are not in play, even if it was, often times there are glitches and of things that need to be fixed, mainly if the connection is still in BETA vinilla form.

[2] Sometimes a password change is prompt, if someone was attempting to access the alleged account. The prompts usually are given if

  • [A] the individual and or other is attempting to login the account or issue a security protocol for a password change from a different device and or IP Address.
  • Another would be multiple attempts to access said account, which also prompts this, sometimes, if the email to said account is linked, it will issue an email, asking you in detail of what is taking place.

[3] I suggest check any emails in regards to password changes and or security changes to an account, but like I said, granted, their application, a public one, doesn't prompt the app holder to create a login to use free material.

[4] Creators of the application and or co-creators cannot hijack people's information. Even if they did, they'd have to go through a ridiculous amount of hashes and encrypted data, which can take literally ages to do. Social Engineering is also impossible on their part (unless it was done by a family member and or friend who is often at the house OR your mother had the information written someone that enabled Social Engineering and or said device was used by someone), unless they personal met your mother to ask her questions of a possible weak password created by her. Do NOT throw IT Techs under the bus, we go by protocol (or else suffer consequence) regarding passwords, using various tools such as the most common - The Active Directory, which allows us to RESET a password by request, in addition to that, depending on the institution, be it pharmaceutical, health, cooperate, etc. A simple task becomes complex due to guidelines and a list of other things. Especially, ESPECIALLY H.I.P.P.A. (Health Insurance Portability and Accountability Act), there is hell to pay if you do not adhere to how they do things in said institutions. That said, if they really wanted to "hijack" they commit to a Bruce Force, which can take ages, even Hackers know this can take ages.

[5] No. I said this strongly for I myself am an I.T. Professional, and have dealt with password and exchange related issues. That being said, a Bruce Force attack takes ages, this also goes for The Man in the Middle Attack. Regardless if they ask for donations or not, that does not prove much. An internal attack can be done, this happen to big banks and some business, example, Target, hence such was done from within, and had access to machines that (majority of the time is not on the Hyper-V and virtualization lane) can be broken into it, if you know how to have access to said servers (DNS, DHCP, etc. and or secondary ones)

[6] The possibility is that there is a spoofed version of the home website of Jehovah's Witnesses, however, most spoofed websites would con you into buying security software, and or force Ransomware, a rootkit, and or other things just by mere interaction and a few clicks. That being said, spoofing websites and or emails is an actual thing. However, in this case, it does not seem to be as such, for here is where your story commits to confusion, be it she is using an application, which you stated it has been downloaded, or she is using the website. As I recall, you cannot download a website, and a free and or public application does not prompt people to create a login and or password. That being said, you are fabricating a story here.

I'd also like to point out that MOST application related to Christianity, Islam, Judaism, etc. and or anything related to the Bible (i.e. Blue Letter Bible) and or Qu'ran (i.e. Quran for Android) are practically 100% FREE, and 100% open to the Public, moreover, such application does not prompt the user to create a login, however, websites, of which said user who has a linked account to whereas said website shows that their applications can be logged into, actually do.

That being said, I leave you with the below:

https://www.cnet.com/how-to/strong-passwords-9-rules-to-help-you-make-and-remember-your-login-credentials/

Not only you protect your logins, but you must also protect your devices too. Never, NEVER, EVER, create a weak password. There are people out there that deal with millions and millions of dollars of people's money, and their passwords are usually "ILOVETHEGIANTS" or "Password01". The stronger the password, the easier you make the IT Tecch's job, no paper trails to go back to, and tickets closed.

Link to comment
Share on other sites





×
×
  • Create New...

Important Information

Terms of Service Confirmation Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.