Christian fundraising site GiveSendGo hacked, names of Freedom Convoy donors leaked: report

Get the latest BPR news delivered free to your inbox daily. SIGN UP HERE

The Canadian Freedom Convoy donor list has reportedly been hacked by a leak site exposing identities and personal information.

Distributed Denial of Secrets (DDoS), a self-described non-profit whose goal is the free transmission of data in the name of the public, declared on their website that they had acquired 30 megabytes of private information from the fundraising site GiveSendGo, Reuters reported. That information includes names, email, and internet protocol (IP) addresses along with zip codes.

After DDoS made the announcement on their site, attempts to access GiveSendGo redirected users to a new domain, GiveSendGone, that stated “GiveSendGo IS NOW FROZEN!”

The video that played during the redirect was a scrolling message described as a manifesto that accused all GiveSendGo donors of supporting, “an insurrection in Ottawa.”

Vice News reported that it was able to review a copy of the data acquired and it included information on 92,845 donors, naming American software billionaire Thomas Siebel as one of them — Siebel reportedly donated $90,000 to the “freedom convoy.”

Mikael Thalen of The Daily Dot explained that the hack came from the discovery of an unsecured Amazon S3 bucket that included scans of passports and driver’s licenses. An Amazon S3 (Simple Storage Service) bucket is “a service offered by [Amazon Web Services] that provides object storage through a web interface,” as explained here.

Many organizations use these storage options provided by Amazon and there have been a number of security breaches stemming from them. Thalen explained that though GiveSendGo “had appeared to fix the issue” the data was still accessible.

Jacob Wells, co-founder of GiveSendGo told The Daily Dot, “We have never and do not collect donors’ IDs.” He went on to say how there “might be the potential that a campaign owner uploaded a ID to a public gallery for their campaign of their own volition and did not properly remove it, but that would be on the campaign owner who uploaded it.”

However the data was uploaded, Wells assured that GiveSendGo was, “looking at our legal recourse options for what looks to be an intentional hit job.”

DDoS claims that due to the sensitive nature of the information they had collected they wouldn’t be posting it publicly.  Rather, their intention is to offer it to “journalists and researchers.”

One journalist, Andy Ngo, pointed out how “many far-left activists” have been trying to “take down/hack GiveSendGo” and punish donors further stating that Twitter was complicit in “criminal activity” through facilitation and encouragement.

GiveSendGo had nearly managed to raise back all the funds that GoFundMe had chosen to refund after succumbing to pressure and legal challenges. At this time, it does not appear as though the leak of information has impacted the funds that have been contributed.

GiveSendGo has been receiving pressure on that front but has assured the public that they will get the money to the truckers.

 

DONATE TO BIZPAC REVIEW

Please help us! If you are fed up with letting radical big tech execs, phony fact-checkers, tyrannical liberals and a lying mainstream media have unprecedented power over your news please consider making a donation to BPR to help us fight them. Now is the time. Truth has never been more critical!

Success! Thank you for donating. Please share BPR content to help combat the lies.
Kevin Haggerty

Comment

We have no tolerance for comments containing violence, racism, profanity, vulgarity, doxing, or discourteous behavior. If a comment is spam, instead of replying to it please click the ∨ icon below and to the right of that comment. Thank you for partnering with us to maintain fruitful conversation.

BPR INSIDER COMMENTS

Scroll down for non-member comments or join our insider conversations by becoming a member. We'd love to have you!

Latest Articles