Home Tags Hollywood

Tag: Hollywood

While the FBI and other law enforcement agencies around the world have successfully been able to shut down a number of illegal online sites this year, The Pirate Bay is not one of them. The Pirate Bay is perhaps the most successful pirate content location on the Internet today—if success is measured by the simple fact that it is still alive despite multiple attempts to sink it. Unlike the Silk Road, which was a Deep Website that hid in the bowels of a hidden underground Tor (The Onion Router) anonymous Web realm, The Pirate Bay operates in plain sight. Also unlike the Silk Road, which was the location where illegal goods were bought and sold, The Pirate Bay is a torrent tracker, providing pointers to where files can be found. Not all of those files are of dubious nature either, though many are. Throughout the years of its existence, The Pirate Bay has become well-known as the place to go to find the latest Hollywood movies, TV shows, games and applications—most of which have been pirated and are in violation of copyright laws around the world. The Pirate Bay has long flaunted its disdain of lawyers and copyright holders alike, celebrating its defiance with a page that lists all the various legal threats that have been leveled against it over the years, by some of the biggest brands in the world. Although The Pirate Bay is still up and running, it has been running from multiple attempts at trying to shut it down. Yesterday, The Pirate Bay was forced to flee from its home base domain of thePirateBay.sx, which is located in Dutch territory of Saint Maarten.

The Pirate Bay had moved to the .sx domain after it was forced to flee the .se Swedish domain in April of this year. The Pirate Bay is now located at the .ac domain, from the Ascension Islands. The astute will also notice, however, that despite the itinerant nature of The Pirate Bay's primary domain location in 2013, the site is also routable simply via ThePirateBay.org domain, which is now forwarded to the new .ac domain home. The continued survival of The Pirate Bay should serve as a reminder to us all that technology can still outwit the law. Time and again, those behind The Pirate Bay sailed their ship of ill repute to safe waters when the winds were blowing against them.

There is no reason to suspect that The Pirate Bay will ever truly be shut down, though there is also no reason to suspect that authorities around the world will ever stop trying to do so. Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.
Review: Film has some fun merit, just don't expect new angles on a complicated subject.    

IZMY P@55W0RD SAPH?

Deciphered passphrases.    
Actress Lily Collins may be gorgeous, talented, and have a famous rocker for a dad, but searching for her online can apparently lead your computer down a not-so-pretty path. September 18, 2013 12:32 PM PDT (Credit: McAfee) Celebrities can be rea...
There's an old adage that on the internet, nobody knows you're a dog. It's been previously used to demonstrate that it's hard, if not impossible at times, to determine whether someone really is who they say they are — be it man, woman, or dog — but it equally applies to hackers. Although offline, it's easy enough to connect with someone's day-to-day personality, it doesn't offer any insight into who they are and how they act online. Let's face it, as much as Hollywood might lead us to believe that hackers gain their street cred from hacking via sophisticated 3D-modelled file systems, or that two people typing on one keyboard doubles a computer's hacking abilities, the more boring reality is that it's mostly done by typing commands into a terminal shell (and I don't mean "access security"). Just as image is everything for some people offline, so too is it online. It's why sites like Zone-H exist, showcasing what websites online attackers have defaced.

And just like in the offline world, many will take credit for others' work, make up successful attacks, or twist simple attacks into what seem like more nobler causes. Which is what may have happened with the Commonwealth Bank of Australia (CBA) recently.

A hacking group going by the name LatinHackTeamReborn, presumably trading off the name of the former LatinHackTeam group, claimed to have breached CBA's UK site. It posted the alleged email addresses, hashed passwords, and names of users on the site, stating that it made its attack by "rerouting after attacking the firewall", and that it was "striking back after what you did to us". The only problem is, it's not CBA's data. "We have done a thorough investigation, and we can confirm that no Commonwealth Bank systems have been hacked and no customer data has been compromised.

The CBA customer information is safe and secure," a spokesperson for the bank told us. It's clear from the leaked data that it's not banking information. CBA uses numerical codes for it online banking system, not email addresses, and the passwords, while hashed, were done using MD5 with no salt.

If such a method of securing passwords was used on a live banking system, it would certainly raise eyebrows, but CBA denies that it belongs to it. But the email addresses do appear to be valid, and, worryingly, of a UK and Australian nature. It's not unheard of for a hacked organisation to lie to the media, and for the information to actually be from a lesser-known and not mission-critical system (we might as well throw "developed by a third party" in here as well). But, digging deeper, I'd be more inclined to trust CBA's word. That's not just because of the damage to its reputation should it be proved that it lied, but because it would really mean trusting a hacker group that only created its Twitter account a few hours prior to the attack, which for some reason decided to include the #stopglobalwarning (yes, warning) hashtag in its attack, and opted for the cryptic, Hollywood-esque method of "rerouting" after attacking a firewall. Wherever this data came from, it didn't happen by picking different routes. It most likely resulted from improper access to a database, probably by using SQL injection. And what has CBA got to do with whatever happened to LatinHackTeam anyway? Nothing, as far as I can tell. It's a bank — and hackers breaking into banks is a sure-fire way to improve your image and gain credibility. Which is probably why the hacking group also claimed to have attacked the Bank of Israel. That would be a significant feat itself; only the email addresses, hashed passwords, and organisations named have nothing to do with the Bank of Israel.

They are actually from leaks posted by others, on previously compromised websites; in this case, the Ontario Imported Wine-Spirit-Beer Association. It runs its site off WordPress, which, if not maintained to the current version, is an easy target for even the most novice attackers, thanks to the wealth of information freely available online. Most of the time, impersonators are going to get away with it because there are few consequences for being named and shamed, and fewer who have the time or inclination to do it ("Bank not hacked" is not a headline, after all).

Even when it does happen, this is the internet, where creating a new alter ego is as simple as a few clicks, and a teenager, or an industry veteran, can be born again as a political greenie against global warning, a freedom fighter, a North Korean official, or perhaps all of them at once. It's true that on the internet, nobody knows if you're a dog, but also, most times nobody knows you're really a dog pretending to be some sort of bank-robbing hacker.