• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

TekSec

My Scribbles on security and whatever strikes my fancy . . .

  • Home
  • About
    • Privacy Policy
    • DISCLAIMER
  • Services
    • Content Strategy
    • Social Media
    • Digital Audit
  • Show Search
Hide Search

That Ashley Madison “Thing”

August 25, 2015 By teksquisite Leave a Comment

Ashley Madison thing

I made it though the AdultFriendFinder’s (AFF) craze, barely…

I am not the type of person that likes a lot of media attention. I tend to find my comfort zone in the area of research and writing. Though I can do any company or brand justice in the realm of social media—  by nature, I am actually a very quiet and introspective person in regards to my private life. You won’t find me tweeting about a trip to the coast or mountains, until after the fact.

Even when I arrived at the point of doxxing via the now defunct Hell forum — I was never worried that my private space would be invaded. I protected that space long ago when I realized that the Internet can retain communications forever. It’s a non-forgiving entity.

On that note…

Yes. I have access to the Ashley Maddison (AM) files. I know that the dumps were made on 7/11/15 and that 36 million email addresses was leaked. Yes, account passwords were encrypted and I know the tables schema. I did compare the PGP public key with the files and they are legit. Beyond that, I have no interest in looking up personal details on any AM subscriber.

I do not know who the Impact Team is, but their motives behind the hack are far from altruistic. Just like ROR[PG} from the AFF hack — the Impact team came out of nowhere. They have no history and nobody knows who they are. Where ROR{RG} threw temper tantrums in the Hell forum screaming that he was releasing the data because AFF did not pay off his buddy to the plight of the AM hackers claiming that they sat on company servers for years due to the injustice of it all — something is intolerably rotten in the state of Denmark.

What is the real impact of this hack on human lives in regard to privacy? Check out troyhunt.com.

 

Facebooktwitterredditpinterestlinkedinmailby feather

Filed Under: TekSec Bytes, Updates

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Visit Us On TwitterVisit Us On FacebookVisit Us On PinterestVisit Us On YoutubeVisit Us On LinkedinCheck Our Feed

Recent Posts

  • 13 Reasons why WordPress hacks are successful
  • Hacked medical devices gaining traction
  • Online Travel Agency Deals: Due Diligence and Dive

Top Posts

  • Safari browser redirects on iPhone, iPad –… (10,232)
  • 6 motivations of cybercriminals–Is it all about the money? (3,983)
  • How to derail a Business Gmail Spam bomb (3,846)

RSS SecurityWeek

  • FBI Agents Secretly Deleted Web Shells From Hacked Microsoft Exchange Servers
  • At Least 100 Million Devices Affected by "NAME:WRECK" DNS Flaws in TCP/IP Stacks

RSS Threatpost

  • How the NAME:WRECK Bugs Impact Consumers, Businesses
  • COVID-Related Threats, PowerShell Attacks Lead Malware Surge

Recent Comments

  • teksquisite on How to derail a Business Gmail Spam bomb
  • Stephanie Cleveland on About
  • bob mbeng64 on How to derail a Business Gmail Spam bomb
  • teksquisite on Remove Query Strings From Static Resources in WordPress
  • Harish on Remove Query Strings From Static Resources in WordPress

Categories

Copyright © 2021 · Teksquisite Security LLC

  • Home
  • About
  • Services
  • Privacy Policy
  • DISCLAIMER