Cryptome has been leaking its user logs for over a year

Michael Best themikebest at gmail.com
Wed Oct 7 14:26:51 PDT 2015


Let me begin by saying that Cryptome initially denied the leak, then that
the data was stolen, then that the whole thing was a fake "a lie by [a]
spy-newbie." Look at the data itself and examine the multiple sources, then
decide for yourself.

It's important to note that the logs were not just found in the USBs John
Young/Cryptome sent to me, but in the ones sent to "bandmon", who unless
I'm mistaken is coderman at gmail.com
https://thepiratebay.mn/torrent/11113511/Cryptome_archive_2014-06-02

Original post at
http://that1archive.neocities.org/subfolder1/cryptome-leaked-logs.html

If you haven't read why the alleged GCHQ slide showing spying on
Cryptome.org's users could have been made by anyone, I recommend you do so
before reading this
<http://that1archive.neocities.org/subfolder1/gchq-cryptome-slide.html>
http://that1archive.neocities.org/subfolder1/gchq-cryptome-slide.html. In
summary, I showed that the information on the slide could have been mocked
up, depsite matching the logs for Cryptome.org. Cryptome has denied the
accuracy of my data, while oddly accusing me of stealing the data, and
leaves me with no alternatives to posting the data online for others to
review and verify.

The data came from Cryptome itself, on a pair of USBs they mailed to me
<https://archive.org/details/cryptome-archive>
https://archive.org/details/cryptome-archive. Within those USBs were server
logs that include user IPs (spanning several months), .htaccess files, and
a pwd file. After finding the data in the USB Cryptome had just sent me, I
sent an email attempting to verify it hadn't been included as something
extra that was not for public distrubition:


More information about the Testlist mailing list