Fausse alerte enlèvement qui tourne (Granges-Marnand) [fr]

[en] Fake SMS doing the rounds here.

Reçu par SMS tout à l’heure:


une petite fille de 2 ans a ete enlevee a Grange Marnand Village par un homme de 30 ans barbu. Il etait vetu tout en noir cet homme est de peau noir. Conduisant une voiture bleu foncee plaque : 27B 138 fait Tourner ce message, ca pourrait sauver la vie de cette petite fille. Fait passer a tous tes contacts ! ca te prendra que 2 minutes! Fais le pour la petite


Soupçons de canular:

  • c’est un message en chaîne (déjà rien que ça)
  • pas de date
  • numéro de plaques qui est pas vaudois
  • le suspect est noir, bien sûr!
  • insistance à la fin du message pour faire passer
  • pas de source
  • je cherche en ligne, je ne trouve rien

Je vais sur la page Facebook de la Police vaudoise et je trouve ceci:


Un autre témoignage corroborant:


Mon réseau me renseigne:


Il semble bien que ce message soit une version “suissifiée” d’un autre message français qui faisait référence à Sarcelles-Village (exemple trouvé rapidement avec Google).

Rappel: les messages qui “tournent” sont quasi tous des fakes. Avant de “transmettre à tous vos contacts” cherchez une source crédible pour votre info. Dans le cas de ce message qui est en train de tourner, en le transmettant à vos contacts vous contribuez par vos bonnes intentions à renforcer des stéréotypes racistes et augmenter la “peur de l’enlèvement” qui est déjà démesurée face au risque réel.

Update: Le Matin dénonce aussi le canular.

Beauté fabriquée [fr]

[en] From nature to billboard in 60 seconds. Via danah, who got it from Boing Boing, who got it from Tom Coates. Read danah's post about this video and the ensuing conversation.

Trouvé chez danah, qui l’a vu chez Boing Boing, qui l’ont eux-mêmes trouvé chez Plasticbag. Lien vers la vidéo originale, mais attention, la vidéo originale sur le site de Dove, c’est du Flash qui ne vous demande pas votre avis avant de commencer et qui ne vous permet pas de l’arrêter. C’est court, par contre: une minute environ.

La vidéo nous montre comment on passe d’un modèle (une vraie femme, humaine) à ce qu’on voit sur les grands panneaux publicitaires. En accéléré, un avant-pendant-après incluant maquillage, coiffure, et photoshop. A regarder. A méditer.

Comme danah a mis sur YouTube une version de la vidéo, je mets un lien vers elle ici:

Note: le photomontage semble être de Cory, mais copié chez moi pour éviter le hotlinking. Pas que les requêtes provenant de ce billet fassent une différence face à Boing Boing…

Comme le dit danah: on est conscientes de ne pas en détenir les droits, mais cette vidéo est trop importante culturellement pour que sa diffusion soit handicapée par le choix malheureux de son format initial.

Alarm: Orcut, Evil Fake Orkut Clone? [en]

How I thought orCut.com might be a phishing operation to grab orKut.com usernames and passwords. A comment on Google’s irresponsibility in encouraging users to fall for phishing.

[fr] Comment j'ai cru que orCut.com était un faux site destiné à  ramasser des mots de passe orKut, et un commentaire sur l'irresponsabilité de Google, qui par de telles pratiques encourage les internautes à  tomber victimes du phishing.

Preliminary note: although nice blogging tools like WordPress have really sexy interfaces for you to type your posts in, resist the temptation. I won’t tell you more, except that Q and W are right next to each other on my keyboard, and that I’m about to write up this bl***y post for the second time.

So, I’m a bit of a referrer junkie. When I see something new, I usually click’n see. Today, I found this in my recent referrals. Now, since I nearly got phished, I’m a bit cautious, and I immediately noticed that it was orCut and not orKut in the URL, even though (particularly as) the pages on the two sites look exactly the same.

Do you smell a rat? I smelled a phish, and it seems I’m not alone. A quick expedition on google, however, tells us that many think orCut.com is legitimate. Scary! Think of what these people would do with all the juicy information they would get out of our Orkut logins and profiles! And hey, it’s not just orCut, there is orkAt too!

But wait. Everybody freeze! Look what Suw managed to dig out: a May 04 post from Evan William’s blog, telling us orkAt, orCut, and even orCIt are legitimate alternatives to orKut.com. Well, we’re most relieved to know this wasn’t all some evil scam — and Ev should know what he’s talking about, as he works from Google.

However, doesn’t it strike you as a trifle irresponsible on the part of Google to do something like this? I mean, doesn’t this make users more vulnerable to phishing? Next time they get a PayPal e-mail with a fake link in it, are their alarm bells going to ring, after their positive experience with the “alternative Orkut URLs”? Methinks they could at least have specified the alternate URLs somewhere on the home pages. A quick trip to orkut.com would have cleared any doubts of mine. ‘Coz now, who is to stop Orkit.com, or any other nice-sounding possible clone that phishers may come up with?

Paypal Scam Nearly Got Me [en]

How I almost got scammed by people masquerading as PayPal. Remember to always type https://paypal.com in your browser, and never to click links!

I consider myself pretty web-savvy and spam/hoax-aware. Today I very nearly got fooled into giving my PayPal information to some shady characters.

This morning I got an e-mail from PayPal — or so I thought. It looked nice and branded, no spelling or grammar mistakes, security warnings telling me not to give my password or anything to anybody, and even a link inviting me to go and see PayPal’s Security Tips page. It was just asking me to login on the site and check my data there (that’s what I understood then, re-reading it now, it says they will verify the information I have entered, which is much more fishy).

I had already made a mental note of one of the PayPal warnings, which is to not trust any other site than https://www.paypal.com/ (I’m not linking it so as not to encourage you to click on links which seem to point there — you’ll understand why in a minute). Now, remember this was early morning for me (don’t you also check your e-mail in the morning?). I clicked on the login link, and noticed the browser was sending me to a website identified by an IP address ( in this case). I stopped everything, and clicked the nice blue link that said https://www.paypal.com/us/cgi-bin/cmd=profile-update. The login page looked furiously like the real PayPal login page, and I was about to login with no second thoughts when I noticed the name in the browser bar was http://www.ssl2-paypal.com/support/update.html — not the link I had clicked on!

I had seen this address before, in another “PayPal” e-mail I had got a couple of weeks back. Already then they had managed to fool me, even though the e-mail was less well crafted than this time. I smelled a rat, so finally typed https://paypal.com/ in my browser and logged in there. Nothing special happened.

I dug out the previous e-mail, slightly worried now. You see, although I had been suspicious about this first e-mail, I do remember that I had logged in somewhere. But to this moment I’m not sure if I logged into the fake website or if I had the sense to point my browser to the real PayPal website myself before logging in. I think I did, I hope I did, and in any case I just checked my account for fraudulous activity and changed my password. The first e-mail was really bad, but I was convinced enough that it came from PayPal to forget about it, just making a mental note that their copywriting was really really poor.

This made the second scam e-mail seem all the more real: when I got it, I thought “oh, so that last e-mail must really have been a fake, this is what a real one looks like.” Poor unsuspecting me.

At this point, I still thought the second e-mail was a “real” one, but that the ssl2-paypal people had someway managed to hack a redirect on the official PayPal site. I hadn’t looked at the e-mail source yet, see?

Anyway, I decided to report the first e-mail I had received.

Coming back home at the end of the day, I had an automated response from PayPal regarding my complaint. It again stated all the security measures to take, in particular the one about always typing https://paypal.com in your browser. And I thought: “you doofuses, you had better stop putting clickable links in your e-mails if you want people to get used to typing the address!”

I was going to respond to them with a more politically correct comment in that direction when I went to have a second look at the e-mail (which, I remind you, I still thought legitimate) I had got in the morning. And that is when I realised that the beautiful blue link was in fact a fake link, disguised as a real one. You can put anything in the href attribute of an achor tag — the catch here is that their link looks a lot like the blue links e-mail reading programs create when they encounter plain-text URL’s.

So, there we go. I was nearly caught by those not-that-dumb spammers. Remember the golden rule:

Always TYPE the address in your browser, don’t CLICK on links in PayPal or other e-mails.