Linked by Thom Holwerda on Fri 3rd Jun 2011 22:26 UTC, submitted by twitterfire
Privacy, Security, Encryption "The hacker group LulzSec on Thursday posted information it took from Sony Entertainment and Sony BMG on its site, called the LulzBoat. The information includes about a million usernames and passwords of customers in the U.S., Netherlands and Belgium and is available for download and posted on the group's site. A release posted on LulzSec's page said the group has more, but can't copy all of the information it stole. The group also said none of the information it took from Sony was encrypted."
Thread beginning with comment 475981
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[2]: Question is...
by Neolander on Sat 4th Jun 2011 08:09 UTC in reply to "RE: Question is..."
Neolander
Member since:
2010-03-08

That amounts to A : they can't stop people from hacking them, no matter how much lobbying they do and how much legal protection they get, be it only because any sane hacker doing this kind of things use the compromised computers of innocent people and leave no track of their identity.

Edited 2011-06-04 08:09 UTC

Reply Parent Score: 1

RE[3]: Question is...
by orestes on Sat 4th Jun 2011 13:36 in reply to "RE[2]: Question is..."
orestes Member since:
2005-07-06

Don't kid yourself. There's no such thing as completely covering your tracks with something like this. The second the government starts throwing words like cyberterrorism around, all sorts of normally frowned upon avenues of investigation open up.

Reply Parent Score: 3

RE[4]: Question is...
by Neolander on Sat 4th Jun 2011 13:49 in reply to "RE[3]: Question is..."
Neolander Member since:
2010-03-08

Well, imagine that you go in a public place like a university's computer room, and subtly steal someone's credentials (easy, people don't hide themselves a lot when typing logins and passwords). Then when the person has left, you log back in on the same computer, using these credentials, to perform your evil deeds, and delete every piece of software you've used if you've used some.

I can't see which data could personally identify yourself in such a scenario.

Reply Parent Score: 1