April 30, 2025
Internet

Does this identity really belong to President Erdogan? Concerned Expert investigated whether e-government has really been hacked!

  • April 14, 2022
  • 0

Last night, Turkey was rocked by a gigantic claim. Many names closely associated with social media shared the messages hackers sent to them, claiming that the 2022 e-Government

Last night, Turkey was rocked by a gigantic claim. Many names closely associated with social media shared the messages hackers sent to them, claiming that the 2022 e-Government data had been seized. With the allegations on Turkey’s agenda, came a statement from the official authorities, data breach allegations do not represent the truth was reported.

However, these statements did not help to clear up the question marks in the minds of many citizens. Well it’s about Was the alleged data breach real or fake? How should the government investigate these allegations? Here are the sayings of two major names in the IT industry. Assistant Professor at Bilgi University of Istanbul, Department of Information and Technology Law Mehmet Bedii Kaya and founder of the threat intelligence monitoring platform VxThreat The sayings of Eyüp Ergün it was like this:

Is President Erdogan’s ID photo real?

Identity images caught the attention of many. But while the possibility that it might be real still frightened some, it was difficult for some to make a firm decision. But the IDs were really amateurish:

So what was the source of the other shared “evidence”? This could have been part of much more general and state-independent leaks:

Speaking of various attacks, let’s not forget the attack we mentioned recently, which involved the seizure of e-government information:

Eyüp Ergün also contacted ‘hackers’ and asked for ‘proof’, and the evidence was ridiculous:

The so-called hackers are also putting the allegedly leaked information up for sale for $150.

In summary, the information allegedly leaked from E-Government may contain data previously seized in completely different places and using different methods (by attacking the user directly, etc.). However, the claim of identity images has been rejected.

True or not, how should the legal process proceed in the allegation that identity information has been leaked from e-government?

Yes, there is a serious assault claim. So, what kind of process should state authorities follow after these allegations, even in the slightest doubt? Here we turn to our other expert on the subject.

While the alleged data breach is not true, there was a real event recently that affected millions.

Source: Web Tekno

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version