Re: [p2p-hackers] what would you like to see most in a p2p social network?

----- Forwarded message from Pierre St Juste <ptony82@gmail.com> -----

Is the report below both technologically and legally credible or just typical cybersecrurity farting for news coverage? What are the P2P Hackers saying about it? Recall Assange claimed to have a million files on hand at the start of Wikileaks and says WL continued to received millions more until recently. To be sure, WL always maximizes counts of whatever it claims to have, the cables amounting to some 261M _words_ of which a 1% have been made public although the statistically insignificant percentage is never farted. http://www.bloomberg.com/news/2011-01-20/wikileaks-may-have-exploited-music -photo-networks-to-get-classified-data.html Snippet: WikiLeaks, condemned by the U.S. government for posting secret data leaked by insiders, may have used music- and photo-sharing networks to obtain and publish classified documents, according to a computer security firm. Tiversa Inc., a company based in Cranberry Township, Pennsylvania, has evidence that WikiLeaks, which has said it doesnt know who provides it with information, may seek out secret data itself, using so-called "peer-to-peer" networks, Chief Executive Officer Robert Boback claimed. He said the government is examining evidence that Tiversa has turned over. The company, which has done investigative searches on behalf of U.S. agencies including the FBI, said it discovered that computers in Sweden were trolling through hard drives accessed from popular peer-to-peer networks such as LimeWire and Kazaa. The same information obtained in those searches later appeared on WikiLeaks, Boback said. WikiLeaks bases its most important servers in Sweden. End snippet.

On Thu, Jan 20, 2011 at 10:37:20AM -0500, John Young wrote:
Is the report below both technologically and legally credible or just
Publishing via an anonymous Internet connection directly to P2P makes sense, and scanning for such information does also make sense, as you can't notify Wikileaks about a document published without drawing even more scrutiny to you. Whether this is happening, or the Tiversa is just being a blowhard will be difficult to say without further evidence, either from WL or from Tiversa.
typical cybersecrurity farting for news coverage? What are the P2P Hackers saying about it?
P2P hackers (mostly) write code, so I don't think they're privy to this. I can ask, of course.
-- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE

On Thu, Jan 20, 2011 at 7:37 AM, John Young <jya@pipeline.com> wrote:
Is the report below both technologically and legally credible ... ?
in the past i've used p2p networks along with traditional search engines to locate documents of interest. in particular, PDF and DOC formats, especially related to "Confidential Information" and court filings. i won't go into details, but suffice to say this is very effective if pursued as a consistent strategy over a modest time period. ("it only takes one..."). and if they've used "redaction" to white-on-white the sensitive bits it's even easier to pull out the high value details within. preaching to the choir here, i was more interested in critical infrastructure at the time, rather than political or other cruft. yet the principal is the same for WL or whoever.

On Thu, Jan 20, 2011 at 9:10 AM, coderman <coderman@gmail.com> wrote:
... documents of interest. in particular, PDF and DOC formats, ...
what is implied, which i should have stated clearly: the less popular extensions and mime types (PDF, DOC, XLS, ODT, etc.) are easy to match and vastly less polluted than the primary media focused content.

On Thu, Jan 20, 2011 at 01:29:25PM -0800, coderman wrote:
So is this deliberately leaked, or accidentally leaked? Accidentally, right? -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE

On Thu, Jan 20, 2011 at 1:43 PM, Eugen Leitl <eugen@leitl.org> wrote:
the vast majority are accidental. the nature of how these incidents occur, and the user interface design failures which encourage them is an interesting tale in and of itself... ;)
participants (3)
-
coderman
-
Eugen Leitl
-
John Young