nettime's_logroller on Mon, 12 Oct 2015 01:26:13 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> Dailydot: Cryptome accidentally leaks its own visitor IP addresses |
< http://www.dailydot.com/politics/cryptome-ip-leak-john-young-michael-best/ > Leak site Cryptome accidentally leaks its own visitor IP addresses By Joseph Cox Oct 9, 2015, 6:01pm CT | Last updated Oct 9, 2015, 8:21pm CT http://bit.ly/1Zmfo8z Cryptome, the Internet's oldest document-exposure site, inadvertently leaked months worth of its own IP logs and other server information, potentially exposing details about its privacy-conscious users. The data, which specifically came from the Cartome sub-directory on Cryptome.org, according to Cryptome co-creator John Young, made their way into the wild when the site logs were included on a pair of USB sticks sent out to a supporter. Twitter user Michael Best reported the problem a few days ago on his website. "Within those USBs were server logs that include user IPs (spanning several months), .htaccess files, and a pwd file," he wrote. He discovered the files when he uploaded the contents of the sticks to the Internet Archive, Best told the Daily Dot in a Twitter message. "Probably best to not expose visitors' data further but then nothing can be fully deleted or hidden." "Scrolling down through the list, I found about a hundred awstats log files listed in a row," he said, referring to Cryptome analytics data. Launched in 1996 by Young and Deborah Natsios, Cryptome was born out of the cypherpunks mailing list, a space where some of the most influential players in cryptography emerged. It currently hosts tens of thousands of documents, news articles, and images, many of which pertain to cryptography, surveillance, and freedom of information. Documents made available through the site include lists of MI6 agents, details on nuclear technology, and much more. It is often referred to as the forefather of WikiLeaks. Last month, Cryptome announced that someone had compromised some of its encryption keys. Returning to the IP logs, Best contacted Young over email and Twitter about the problem. Eventually Cryptome said that Best had faked the data. "When he accused me of faking the data is when I dumped it, since he didn't acknowledge the problem and was making accusations against me," Best said. The data published by Best, which was reviewed by the Daily Dot, includes IP logs of visitors to certain pages of Cryptome during a few select months in 2009 and 2010. There are also files indicating what search terms people have used to land on the site. When initially asked whether he had anything to add, Young told the Daily Dot in an email, "No." But shortly after, Young confirmed to Best in an email that the data was accurate. "You were right about AWStats data. Not the stats for Cryptome itself but for the Cartome sub-directory, for four months, November 2009-February 2010," Young wrote. "Included in a full site restoration by ISP NetSol after a full shutdown in June 2013." "The stats have been deleted from the Cryptome archive," Young added. "Probably best to not expose visitors' data further but then nothing can be fully deleted or hidden. Thanks for discovering and reporting in this." Best has also reportedly deleted the data from his site. When asked whether that message was legitimate, Young told the Daily Dot in an email, "Yes." "Best is as dogged as Cryptome," Young added in a later email. "We admire that and encourage him to get even more pugnacious, as if he needed it. Should be many more to offset the rising excess of suavely devious spying, advertising and oligarch ass-lickers hoboing the runaway online money train." # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime@kein.org