{"id":3287,"date":"2008-09-19T07:18:52","date_gmt":"2008-09-19T11:18:52","guid":{"rendered":"http:\/\/valorguardians.com\/blog\/?p=3287"},"modified":"2008-09-19T07:18:52","modified_gmt":"2008-09-19T11:18:52","slug":"ap-covers-for-hacker","status":"publish","type":"post","link":"https:\/\/www.azuse.cloud\/?p=3287","title":{"rendered":"AP covers for hacker"},"content":{"rendered":"<p>Michelle Malkin has been all over the email theft of Sarah Palin&#8217;s personal email (links <a href=\"http:\/\/michellemalkin.com\/2008\/09\/17\/the-story-behind-the-palin-e-mail-hacking\/\" target=\"_blank\">here<\/a> and <a href=\"http:\/\/michellemalkin.com\/2008\/09\/18\/closing-in-on-the-palin-e-mail-hacker\/\" target=\"_blank\">here<\/a>) and last night Ms. Malkin wrote about <a href=\"http:\/\/michellemalkin.com\/2008\/09\/18\/ap-reporter-e-mails-yeah-its-all-palins-fault\/\" target=\"_blank\">an email exchange between AP reporter<\/a> Ted Bridis and a reader in which Bridis blames Ms. Palin for the breach.<\/p>\n<blockquote><p>If Gov. Palin hadn\u2019t been using a consumer-level Yahoo! account (more than one, actually) this crime wouldn\u2019t have happened because the hacker exploited the service\u2019s \u201cforgot-my-password\u201d mechanism, which is inherently insecure.<\/p><\/blockquote>\n<p>Well, it also wouldn&#8217;t have happened if the Washington Post hadn&#8217;t broadcast her email account either.<\/p>\n<p>I wonder how defensive Mr. Bridis would be if the &#8220;hacker&#8221; was someone like, oh, say Rusty Shackelford of <a href=\"http:\/\/mypetjawa.mu.nu\/\" target=\"_blank\">The Jawa Report<\/a> and the &#8220;hackee&#8221; was some scumbag terrorist plotting to blow up New York City?\u00a0 I wonder who Bridis would pin the blame on then.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Michelle Malkin has been all over the email theft of Sarah Palin&#8217;s personal email (links here &hellip; <a title=\"AP covers for hacker\" class=\"hm-read-more\" href=\"https:\/\/www.azuse.cloud\/?p=3287\"><span class=\"screen-reader-text\">AP covers for hacker<\/span>Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-3287","post","type-post","status-publish","format-standard","hentry","category-politics"],"_links":{"self":[{"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/posts\/3287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3287"}],"version-history":[{"count":0,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=\/wp\/v2\/posts\/3287\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.azuse.cloud\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}