中國政府利用網絡安全供應商 奇虎360 的服務
在香港用戶的瀏覽器中植入代碼進行 DDOS 網絡攻擊,企圖癱瘓香港連登論壇,打壓香港言論自由!!!
文宣巴打同我推上 蘋果 twitter 外媒 白宮 搞大佢



The #Chinazi government make use of QiHu, a China security company's service to inject code into Hong Kong's users browsers, in order to stage a state-funded Distributed Denial Of Service (#DDOS) attack towards the #LIHKG forum, which serves as a important platform for communication of #HongKong protesters, attempting to suppress the #FreedomOfSpeech in Hong Kong.
This fully demostartes the #Chinazi government's agression in controling the world's internet mainly through means of Huawei and TikTok. Let's support the US government's effort in battling these cyber threats led by President @realDonaldTrump!
Technical Proof:
1. Access http://www.transfun.net/forum.php?mod=viewthread&tid=13154&extra=page%3D1%26filter%3Dtypeid%26typeid%3D11 from a Hong Kong IP address, preharps using a Hong Kong based VPN, a poor website that utilized QiHu's service and unfortunately being abused for #Chinazi's state-funded DDOS attack.
2. One can see a lot of network request to lihkg.com if you activate the Browser Developer Tools. https://i.lihkg.com/540/https://na.cx/i/ompktT5.png
3. If we read the website's source code, we can see a highly malicious script being attached as accessible by http://js.passport.qihucdn.com/11.0.1.js?5d5100a4a5a2ac6a47af3cb82952cc7b
4. Analyzing the script, we can find that it exactly contains code to perform DDOS attack on lihkg.com, the forum that is popular among HK protesters. https://i.lihkg.com/540/https://na.cx/i/HDacj83.png
5. By checking the WHOIS record of qihucdn.com, which is the source of this script, we can see that it is owned by QiHu 360, a China based computer security company. https://www.whois.com/whois/qihucdn.com
Please defend the world from China's aggression on controlling the world's internet freedom!
大家針住呢個位做文宣



貿易戰靠晒大家


