news.com: Tool mines personal data from across Net
Bob Rosenberg
bob.redmountain at gmail.com
Fri Apr 20 08:42:07 PDT 2007
Dave
Perhaps for IP.
Bob
Tool mines personal data from across Net
By Joris Evers
http://news.com.com/Tool+mines+personal+data+from+across+Net/
2100-1029_3-6177625.html
Story last modified Thu Apr 19 12:51:40 PDT 2007
VANCOUVER, B.C.--Who needs to dive through dumpsters or steal snail
mail when so many details on people are available simply by searching
the Web?
South African security researcher Roelof Temmingh, known for his work
on security tools such as Wikto, is taking the search for personal
information a step farther.
Temmingh--who spoke at the CanSecWest security conference here
Wednesday--has crafted a tool dubbed "Evolution" that associates data
found in multiple search engines and social-networking Web sites such
as MySpace.com and LinkedIn. It also uses other sites' tools to find
information behind Internet Protocol addresses, Domain Name System
entries, domain registration and more.
As a result, a search for a person will associate the individual with
results found across the Net. The idea is that data found in one
place can bring up results elsewhere. For example, an e-mail address
may bring up a domain name, which in the next search may bring up a
physical address.
The searches could also connect work e-mail addresses with home phone
numbers and expose details such as which NASA employees use social-
networking sites and find people at the National Security Agency who
use Google's Gmail, said Temmingh. Evolution, currently in its early
stages, does all that automatically, he said. Temmingh created the
tool not just to demonstrate his skills, but also to highlight just
how much personal data the Net holds, and how vulnerable it is.
The results can help somebody doing research into an individual, but
they can also help a potential fraudster, Temmingh said. A search can
expose information helpful for social-engineering attacks. Also, it
can expose secondary targets as it will bring up information on
individuals' alliances with people or organizations.
Another possible use is "virtual identity theft," Temmingh said. You
can assume a person's identity by registering free e-mail addresses
in their name, setting up MySpace and LinkedIn profiles as them and
getting the identity out so it gets indexed by search engines, he said.
Copyright )1995-2007 CNET Networks, Inc. All rights reserved.
-------------------------------------------
Archives: http://v2.listbox.com/member/archive/247/=now
RSS Feed: http://v2.listbox.com/member/archive/rss/247/
Powered by Listbox: http://www.listbox.com
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
More information about the cypherpunks-legacy
mailing list