Why cryptome sold web logs to their paying customers?

Razer Rayzer at riseup.net
Sat Oct 10 10:10:35 PDT 2015


From the article:

> "He discovered the files when he uploaded the contents of the sticks
> to the Internet Archive..."

Where the fuck does Michael Best, "researcher", get off publishing
material THAT IS NOT HIS WORKS OR PLAINLY PUBLIC DOMAIN to IA?

This is an example of the kind of material IA expects to see:

https://archive.org/details/CabaleNewsServices

With permission of the creator... NOT server logs he just happens to
have lying around.

RR



On 10/09/2015 11:53 PM, Georgi Guninski wrote:
> The main question is:
>
> 1. Why cryptome sold web logs to their paying customers?
>
> Related questions:
>
> 2. Did they do it on purpose?
> 3. Did LEAs already had the logs via sniffing (at that time cryptome.org
> didn't have SSL AFAIK)?
> 4. Is it likely that the web server (and likely all internet connected
> machines of cryptome operators) was compromised?
>
> In other news JYA talks in nearly prose:
> http://www.dailydot.com/politics/cryptome-ip-leak-john-young-michael-best/
>


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20151010/717c179e/attachment-0003.sig>


More information about the cypherpunks mailing list