Re: [cryptome] Cryptome for sale with access log files from 1996 for $50, 000, 000
On October 14, 2015 9:32:30 PM John Young <jya@pipeline.com> wrote:
Cryptome for sale with access log files from 1996 for $50,000,000. --
So, its been a day since this was posted. It appears as though neither JYA nor Cryptome have been compromised and the posts and tweets that have followed appear to be authentic JY. I've been a bit busy today, so - have I missed it? John's explanation of why he would keep access logs going back to 1996, when it was posted on Cryptome itself for years that logs were deleted daily or better - and he gave an affidavit to a grand jury stating that he had no such files? Or perhaps why he wants to sell out in the first place? If he's tired of doing it, I get it. If he wants to enjoy his remaining time on the planet instead of dealing with this BS, more power to him. But why go out this way? The legacy he has built with that site is being crushed. Without Cryptome, there would likely be no Wikileaks. No Manning, no Snowden. This isn't just about being identified in the logs, but their very existence. Those of you who insist on trying to divert the conversation away by blaming people for not being behind 7 proxies are just wasting space. We know, we preach it too! That is not the point. Personally, I don't give a fck if my info is in the log files. If I did, I surely would not be posting to public lists about it. I'm probably on enough "watch lists" already that visiting Cryptome isn't going to make a damn bit of difference. No, I'm concerned for sources that gave info and documents to Cryptome. For people in countries where they possibly face dire consequences for even viewing such info (jail, torture, even death.) It's not funny, and it's not right. From what I've heard, a bunch of us would really appreciate an explanation from John - in plain English. -Shelley
On Thu, Oct 15, 2015 at 11:23:37PM -0700, Shelley wrote:
It's not funny, and it's not right. From what I've heard, a bunch of us would really appreciate an explanation from John - in plain English.
I am not JYA's lawyer. I strongly suspect JYA didn't sell any logs from this offer and never will at price of current value of $50M since the logs almost surely might be owned for a small fraction of this. IMHO it was made for one or more of following: joke, sarcasm, warning. As someone already wrote at least twice: NSA almost surely have all these logs.
From: Georgi Guninski <guninski@guninski.com>
I am not JYA's lawyer. I strongly suspect JYA didn't sell any logs from this offer and never will at price of current value of $50M since the logs almost surely might be owned for a small fraction of this. IMHO it was made for one or more of following: joke, sarcasm, warning. I took it as a joke and sarcasm.
As someone already wrote at least twice: NSA almost surely have all these logs. Just as the NSA should have all of Hillary's emails. (If they don't...why not?) Maybe the knowledge that the NSA 'had to' have those emails made it necessary that they didn't disappear elsewhere. Myself, I remain greatly appreciative that John Young has worked for for nearly 20 years exposing any kind of information that some government, somewhere, doesn't want to see publicized. The value of that is incalculable. Jim Bell
Cryptome's offer to sell itself and logs for the amount Omidyar is tax writing off at The Intercept, and skying the donation for its archive to the weekly stipend of top Snowden exploiters, is a parody of what highly-profitable web sites like e-Bay, ISPs, equipment, program and cybersecurity peddlers, and net operators and overseers are doing. Access, traffic and transaction logs are ginned, sorted, stored, munged, manipulated, sold, stolen, and more, all along the many packeting, hops, boosts, diversions, conversions, hand-offs to various devices of the route from user to destination. End point of user and the destination is merely one bit of data, well, two bits, with gobs of bits quietly being gobbled elsewhere, camouflaged by the delusion of privacy policies, anonymization, and website log deletion or never ginning logs. Cryptome has no logs, never has. Its various ISPs have copious logs of many kinds (not just the simplistic access logs meant to delude website operators), along with all the other transceivers of visitor activities and transaction metadata and metametadata. Cryptome has never run a server, just buy the service. We do track our ISPs' activities and through them the ganglia of the Internet to see what happens to our files. Voracious bots have always been the heaviest users of Cryptome, siphoning files hourly, daily, monthly, then providing them to users at other locations to gin their own families of data for sale to govs, coms, edus, banks, investigators, investors. Google, Bing, Internet Archive, Torrent, drops, govs, spies, academics, researchers, cyberseckers, take, steal actually (as do we), Internet files for their own use which is primarily to gather data on users, the precious jewels of the Internet which underwrite its so-called free service. Public benefit aggregators like Internet Archive, Wikipedia, Google docs, universities, NGOs, are the prime abusers of visitor data, both to their websites and by special privilege of advising visitors on how to protect their privacy while being pickpocketed of personal data. Cybersecurity con artists are as bad by deluding their visitors and customers about how to protect themselves with encryption, Tor, anonymization, OTR, secret chats, deep web, blah, blah. All these con artists gin their own logs of trusting-users data, then either hand it over to authorities, sell it covertly, share with cohorts and standards orgs, write papers and give speeches soliciting customers, testify in Congress and courts, inform grand juries, cut plea bargains, brag about resisting NSLs, set up warrant canaries, share tips with donors and investors, yadda, yadda, do donate generously, but best, generate taxable income, tax write-offs, never-ending war, paranoia and FUD. Cryptome has no privacy or security policy to deceive visitors, and periodically announce that, and warn not to trust us or any other website, especially those which advocate HTTPS, anonymization, privacy, security and crow about civil liberties and public benefit. At 03:31 AM 10/16/2015, you wrote:
On Thu, Oct 15, 2015 at 11:23:37PM -0700, Shelley wrote:
It's not funny, and it's not right. From what I've heard, a bunch of us would really appreciate an explanation from John - in plain English.
I am not JYA's lawyer.
I strongly suspect JYA didn't sell any logs from this offer and never will at price of current value of $50M since the logs almost surely might be owned for a small fraction of this.
IMHO it was made for one or more of following: joke, sarcasm, warning.
As someone already wrote at least twice: NSA almost surely have all these logs.
On 10/15/2015 11:23 PM, Shelley wrote:
This isn't just about being identified in the logs, but their very existence.
I'll repeat myself, with emphasis:
Yeh, apparently Pierre Omidyar has offered John a position as journalist and so John no longer needs to run Cryptome :D John's doing a 'BB', and he hasn't even done time... Because there's nothing to do time over, and TRULY, nothing worthwhile to see in Cryptome's logs. *The only potential 'stink' here is if John had said he wasn't keeping logs, and he did so HIMSELF. If Network Solutions did so and kept the logs as required by the feds (and by the feds for perpetuity if
On 10/15/2015 02:05 AM, oshwm wrote: there's encrypted data), there's fuckingwellnothing John could do about it, and IF he could acquire them from NetSol to sell signed and numbered editions, it NOT on him, but on all the idiots who visited his site 'barefoot'.*
RR
participants (5)
-
Georgi Guninski
-
jim bell
-
John Young
-
Razer
-
Shelley