First Forth, C and Python, now comp.lang.tcl latest Usenet programming forum nuked by Google Groups

Newsgroup restored after spam sinks entire board

Updated The Usenet group comp.lang.tcl vanished from Google Groups for several hours before being restored on Tuesday.

The reason, according to Arjen Markus, an engineer based in the Netherlands and Tcl programmer, is that a spammer posted abusive content to the group.

"We have seen a single obnoxious poster who posts long Italian posts ranting about murderers and other criminals," said Markus in a Hacker News post. "The posts are easily recognized because they are all in capitals with very long titles. As a group we have reported these postings as abuse and then they get hidden from the ordinary overview. For this sanitary action we seem to have been punished."

The group for a time displayed the following notice:

Banned content warning comp.lang.tcl has been identified as containing spam, malware, or other malicious content.

Google Groups users subsequently posted support requests asking for comp.lang.tcl to be reinstated to Google Groups.

As of about 10:22 PDT, access was restored.

The support moderator responding to the complaints about the takedown said that there's no way to prevent a Usenet newsgroup from being banned or unbanned because the group has no owner.

Google did not immediately respond to a request to explain what happened, though it has been a longstanding problem that Google's response to unlawful or problematic content has been to remove entire discussion groups rather than individual posts.

The Usenet group's fortuitously brief exclusion from Google Groups is the latest in a series of content takedowns affecting historic Usenet newsgroups both related to programming and otherwise.

Usenet deja vu

Google took over the Usenet archive when it acquired Deja News in 2001.

Almost a year ago, comp.lang.forth and comp.lang.lisp, were also removed from Google Groups. And they remain unavailable. Likewise, comp.lang.c and comp.lang.python are currently inaccessible via Google Groups.

The suppression of Usenet groups has cultural, academic, and technical consequences. Some active systems, for example, still rely on Forth.

There are options, however, to find content banished from Google Groups. NNTP (Network News Transfer Protocol) client software may provide access denied by the Google Groups web interface (corporate firewall permitting). As an alternative, other copies of these discussions, some of which date back to the early 1980s, have been saved to the Giganews Usenet Collection and to the Usenet Historical Collection at the Internet Archives.

Recently, disappeared.

"This is a historical group with Usenet messages going back to the 90's," wrote an individual identified as Chris Barbarello in a Google Groups support request last month. "Right now I can't view any of them because Groups is throwing a 'banned content' warning. What can I do to view the historical posts? There has to be a way to salvage the historical data for viewing."

Presently, that way routes around Google Groups. And perhaps it's not too much to hope that Google might one day find a way to target troublesome content with more precision. ®

Updated to add

We note that since the publication of this story, the aforementioned vanished Google Groups have been restored.

Broader topics

Other stories you might like

  • Deepfake attacks can easily trick live facial recognition systems online
    Plus: Next PyTorch release will support Apple GPUs so devs can train neural networks on their own laptops

    In brief Miscreants can easily steal someone else's identity by tricking live facial recognition software using deepfakes, according to a new report.

    Sensity AI, a startup focused on tackling identity fraud, carried out a series of pretend attacks. Engineers scanned the image of someone from an ID card, and mapped their likeness onto another person's face. Sensity then tested whether they could breach live facial recognition systems by tricking them into believing the pretend attacker is a real user.

    So-called "liveness tests" try to authenticate identities in real-time, relying on images or video streams from cameras like face recognition used to unlock mobile phones, for example. Nine out of ten vendors failed Sensity's live deepfake attacks.

    Continue reading
  • Lonestar plans to put datacenters in the Moon's lava tubes
    How? Founder tells The Register 'Robots… lots of robots'

    Imagine a future where racks of computer servers hum quietly in darkness below the surface of the Moon.

    Here is where some of the most important data is stored, to be left untouched for as long as can be. The idea sounds like something from science-fiction, but one startup that recently emerged from stealth is trying to turn it into a reality. Lonestar Data Holdings has a unique mission unlike any other cloud provider: to build datacenters on the Moon backing up the world's data.

    "It's inconceivable to me that we are keeping our most precious assets, our knowledge and our data, on Earth, where we're setting off bombs and burning things," Christopher Stott, founder and CEO of Lonestar, told The Register. "We need to put our assets in place off our planet, where we can keep it safe."

    Continue reading
  • Conti: Russian-backed rulers of Costa Rican hacktocracy?
    Also, Chinese IT admin jailed for deleting database, and the NSA promises no more backdoors

    In brief The notorious Russian-aligned Conti ransomware gang has upped the ante in its attack against Costa Rica, threatening to overthrow the government if it doesn't pay a $20 million ransom. 

    Costa Rican president Rodrigo Chaves said that the country is effectively at war with the gang, who in April infiltrated the government's computer systems, gaining a foothold in 27 agencies at various government levels. The US State Department has offered a $15 million reward leading to the capture of Conti's leaders, who it said have made more than $150 million from 1,000+ victims.

    Conti claimed this week that it has insiders in the Costa Rican government, the AP reported, warning that "We are determined to overthrow the government by means of a cyber attack, we have already shown you all the strength and power, you have introduced an emergency." 

    Continue reading

Biting the hand that feeds IT © 1998–2022