Password Hackers Do Big Business With Ex-Lovers 197
Hugh Pickens writes "The Washington Post reports that disgruntled lovers and spouses considering divorce are flocking to services like YourHackerz.com that boast they have little trouble hacking into Web-based e-mail systems like AOL, Yahoo, Gmail, Facebook and Hotmail. The services advertise openly, and there doesn't appear to be much anyone can do about it because while federal law prohibits hacking into e-mail, without further illegal activity, it's only a misdemeanor, says Orin Kerr, a law professor at George Washington University. 'The feds usually don't have the resources to investigate and prosecute misdemeanors,' says Kerr. 'And part of the reason is that normally it's hard to know when an account has been compromised, because e-mail snooping doesn't leave a trace.' It's not clear where YourHackerz.com is located, but experts suspect that most password hacking businesses are based overseas."
Blaming the tools, instead of the behaviour... (Score:2, Informative)
"normally it's hard to know when an account has been compromised, because e-mail snooping doesn't leave a trace."
Well that's incorrect. I'd be fairly confident that most web-based email services have a way of telling when you logged into your account last (otherwise how would they know when to deactivate your account after X months of inactivity?) - they simply choose not to allow Joe Average to access this information.
Re:Blaming the tools, instead of the behaviour... (Score:5, Insightful)
GMail has a nice line at the bottom, telling you from which other computer you are connected, when you last took any action, and then some more details. Anyone can take a look at it, but I don't expect much of their users to know what that is for, nor to check it everytime they login ...
Re: (Score:3, Insightful)
Most people don't make efforts.
Maybe if the last activity notice were in the sidebar or near the top of the screen it might be more effective.
I also love how the lead-in to the story discusses a woman who apparently became jealous because her "married boyfriend" was cheating on her...
Re: (Score:2)
One press and all the way down you go ;-)
Ooh, look. Turtles!
Seriously though, most people don't know what an IP address is, and don't care. There are ways that this could be made easier (when you log in from a "new-to-gmail" IP more than a few times, have it ask you to label as Home/Work/Friend's House/etc), but 1.2.3.4 means nothing to most people outside of /. It's just that computer-speak anyway and "I never need to worry because I've got this friend in Nigeria who's giving me lots of money".
compromised (Score:5, Insightful)
And part of the reason is that normally it's hard to know when an account has been compromised, because e-mail snooping doesn't leave a trace
Simply do like most client systems and put in big red bold: "someone tried to connect to your account 32 times from w.x.y.z ...", and keep something like a 30 days log of connection history browsable somewhere. I'm sure modern techniques can also be used to highlight strange connection patterns and/or unusual connection location. Although it's far from perfect it at least gives some basic tools to be aware and deal with this situation. And if the hackers know their address is not only logged in an obscure web log but also available to the user (with a nice helpful tips page about what to do and who to contact when you're a victim) it would probably intimidate part of them.
Re:compromised (Score:5, Insightful)
Simply do like most client systems and put in big red bold: "someone tried to connect to your account 32 times from w.x.y.z ...", and keep something like a 30 days log of connection history browsable somewhere.
Yeah, because the average person is going to know what subnet or network they're coming in from. And they'll remember that time they logged in from the coffee house. No -- the information is useless to the average person because they don't know how to interpret it. It'd be like me telling you that the R0 of variola vera is about 6.5. Meaningless to you in this context.
Re:compromised (Score:4, Insightful)
No -- the information is useless to the average person because they don't know how to interpret it.
So? Help them interpret it. That's what computers are for. You can't tell me that that raw data can't be presented in some way that does make sense to Average Joe and at least gives him the idea that somebody is screwing with him.
Re: (Score:2)
My online banking makes me read "You last logged in on Monday 12th June at 14:34. If this wasn't you, please phone 08000...".
I'm useless at remembering when I last logged in, it would be better for me if they put the IP address as well.
Re: (Score:2)
Yes, but then it becomes a problem of education. How do you educate users who don't care to read what's on the screen, even if it's for their own good?
Well, stupidity carries its own reward.
Re: (Score:2)
Re:compromised (Score:4, Insightful)
"Since the last successful login Yesterday at 7:13, 48 attempts to log into your account with a wrong password have been made from 3 locations. [details]"
Simple as that. More detail wouldn't help most users, so let them know something potentially bad is happening. If they care about their account, they'll have a techie friend look into it.
Re: (Score:2)
It's not the IP address that matters, it's the fact that a single source made 32 attempts to login to your account. This warning might prompt you to take additional steps, such as changing your password to something random.
I once had someone try repeatedly to access one of my online accounts. I changed the lost password challenge question to "Go f**k yourself".
Re: (Score:2)
> It's not the IP address that matters, it's the fact that a single source
> made 32 attempts to login to your account. This warning might prompt you to
> take additional steps, such as changing your password to something random.
This warning will not prompt most non-geek users to change their passwords,
but to call their bank in panic and BITCH at them why THEY don't do something
about it. And that's why the banks will not disclose that information because
they don't want to have to deal with the fallou
Re: (Score:2)
That's the difference between us and them. They don't care what "subnet" means. I needed to know what R0 meant.
Re: (Score:2)
Re: (Score:2)
Well, when almost all the activity is from 2 ips - hoe and...
Spend a lot of time there do you?
Re:compromised (Score:5, Informative)
Google Mail gives you an activity log: http://mail.google.com/support/bin/answer.py?ctx=gmail&answer=45938 [google.com]
It's pretty damn cool.
Re: (Score:2)
for websites, it's super easy to see who's visited, with many online services providing this.
why isn't there a way to attach a counter to your inbox (i'm looking at gmail)? could it be embedded in a custom theme?
Re: (Score:2)
So Gmail tells me that someone's tried to guess my password - so what? What am I supposed to do with this information? Which part of a hacker would be intimidated by the fact that the IP address of the proxy(s) they are using is logged somewhere?
The part that doesn't want to give their victim the benefits of a warning or notification that their email is being read by said hacker.
Text of the Article (Score:3, Funny)
Password Hackers Are Slippery To Collar
By Tom Jackman
Washington Post Staff Writer
Monday, September 7, 2009
When Elaine Cioni found out that her married boyfriend had other girlfriends, she became obsessed, federal prosecutors say. So she turned to YourHackerz.com.
And for only $100, YourHackerz.com provided Cioni, then living in Northern Virginia, with the password to her boyfriend's AOL e-mail account, court records show. For another $100, she got her boyfriend's wife's e-mail password. And then the passwords of at least one other girlfriend and the boyfriend's two children. None had any clue what Cioni was doing, they would later testify.
Cioni, however, went further and began making harassing phone calls to her boyfriend and his family, using a "spoofing" service to disguise her voice as a man's. This attracted the attention of federal authorities, who prosecuted Cioni, 53, in Alexandria last year for unauthorized access to computers, among other crimes. She was convicted and is serving a 15-month sentence.
But such services as YourHackerz.com are still active and plentiful, with clever names like "piratecrackers.com" and "hackmail.net." They boast of having little trouble hacking into such Web-based e-mail systems as AOL, Yahoo, Gmail, Facebook and Hotmail, and they advertise openly.
And, experts said, there doesn't appear to be much anyone can do about it.
"This is an important point that people haven't grasped," said Peter Eckersley, a staff technologist for the Electronic Frontier Foundation in San Francisco. "We've been using e-mail for years, and it's been insecure all that time. . . . If you have any hacker who is competent and spends the time and targets you, he's going to get you."
Federal law prohibits hacking into e-mail, but without further illegal activity, it's only a misdemeanor, noted Orin Kerr, a law professor at George Washington University and a former trial attorney in the Justice Department's computer crime section.
"The feds usually don't have the resources to investigate and prosecute misdemeanors," Kerr said. "And part of the reason is that normally it's hard to know when an account has been compromised, because e-mail snooping doesn't leave a trace."
Every state has laws roughly similar to the federal computer laws, Kerr said, and rate the offenses as misdemeanors.
Not long after Gov. Sarah Palin of Alaska was named the Republican nominee for vice president last year, someone hacked into her personal Yahoo e-mail accounts. And as the election neared, someone at George Mason University hacked into the e-mail of the school's provost and sent a schoolwide e-mail saying the election date had been changed.
"Web Based email password hacking or cracking is one of our all time favourite and unique hobby," write the folks at YourHackerz.com. It's not clear where YourHackerz.com is located, but experts suspect that most of the businesses are based overseas. "We will provide you with the original Passwords. No questions asked whatsoever. Payment only after you are CONVINCED. 100% guarantee of Cracking. Total privacy of your information. No legal hassles."
At SlickHackers.com, they boast, "We are professionals interested in helping serious people for whom an email password would mean saving their marriage, knowing the truth, preventing a fraud, protecting their family/job/interests only when conventional ways and normal procedures do not work."
All the services advertise that they will e-mail a screenshot of the target's in-box or even send an e-mail from the target's e-mail as proof that they've cracked the password. The customer then sends payment. One service, whose fee is only 20 British pounds (about $33), then responds with the script from a scene from a Shakespeare play, with the stolen password hidden in the copy.
E-mail inquiries to several of these services did not elicit any responses.
The FBI cannot police the Internet, a spokesman said. "The FBI is aware of these illegal services," spok
Re: (Score:2)
mod parent funny.
Oh no. Mod TFA funny.
No! mod Elaine Cioni funny (didn't find the 'freak' mod option)
Moo, moo. (Score:5, Interesting)
Yeah, well I'd say it's a big reason why I get phone calls. I hung my shingle out a long time ago about being a computer geek. People usually come to me for one of three reasons: First, their computer's suddenly running slow. "But I've tried everything." Malware is the main reason. Second is "It won't turn on anymore." Coffee spill on laptop, or HDD failure without error message. And the third most common reason: "I want to ruin someone's life! You're a hacker, right?"
Of course, these are my friends, not strangers. I usually oblige them by asking if they knew what common passwords their ex used, any websites they frequented, the full spelling of their name, date of birth, and social security number. And the strange part is: They usually know all of these things. You know what I do then? Nothing. Not a damn thing. I sit down and have a long talk with them about personal security and how just like we don't go out alone at night (I'm a girl. Most of my friends are girls -- I know most of you are dudes and don't think about it much), we also need to take precautions online! This is usually said while saying what a bastard the guy was. And I give them a pat on the head, some candy I keep around for this purpose, and send them on their way.
I'm a white hat (eh, most of the time). But a lot of people just like me know this about others because they've hung their shingle out too and announced they're a geek. And not all of them are going to have an ethical hangup about sucking up all your personal data, hacking your accounts, and leaving "I have a small penis" written to all your friends. Because really... The average person if you do go through all the effort to get them access just sits there feeling all powerful for a minute and then does something incredibly juvenile that'll make you wish you'd done your laundry instead of wasted two hours at the keyboard.
My advice to you people: Love your partner. But do not give them the root password!
P.S. Only once ever have I done a spot of sleuthing that I felt was worth it -- when I discovered a friend-of-a-friend was dating a terrorist. No, I don't mean the fluffy-bunny kind that the media portrays either (everything is terrorism these days). No, I mean the guy came overseas, setup shop over here, and was doing serious criminal enterprise and had cases open with a half-dozen agencies. A few days later, a police officer informed her that if she valued her life, she should cease contact with him immediately. Fun times. Everything else though? Boring as shit.
Re:Moo, moo. (Score:4, Interesting)
But maybe these different patterns relate to the fact that I am male?
More likely it's that girls have a lot more aqaintances and casual contacts than men do... And that we gossip so that people who know of us extends beyond a few close friends and coworkers but into the friend-of-a-cousin-of-a-friend's boyfriend scope. That, and most guys just want to be done with the drama and suffer in silence when it ends. Girls don't usually skip the part of the process that entails great amounts of fire and brimstone. Of course, in the end it's all a tempest in a teapot, but that doesn't stop them from beating a path to my door and getting Lecture #46.
Re: (Score:2)
Don't tell anyone the unknown fact that most people use the same password for everything. I was interested in a certain female, so I gained physical access to a machine that person used, booted with a Live-CD, and sent the log-in files to a networked hidey hole. John the Hacker later cracked the password for me. The same password logged me into 3 different webmails, Yahoo, Myspace, and some sex-for-sale sites, as well as a couple gay sites. Of course, IE's and XP's handy log features had already told me
Re: (Score:3, Insightful)
That, and most guys just want to be done with the drama and suffer in silence when it ends.
we save that for the next common cold...
Re: (Score:2)
It's not a stereotype if it's her observed reality. Anecdote is not data, but personal experience is not stereotype.
Re: (Score:2)
Re: (Score:3, Interesting)
(hey, don't look at me, I'd love to see female engineers and scientists just as much as you do).
Then stop treating them as sex objects when they show up for work!
That is actually a lot harder than people realize. We The People are animals first and foremost, and then everything else. Whenever most people see a person of the opposite gender, the first thing they see is that they are of the opposite gender. This is biology, at which most people have more experience than at their culture, education and work ethics.
The better and broader your education and culture, the faster they kick in to cushion the action of pure animal instinct, but do not be fooled, its there and
Re: (Score:2)
Not really. In her eyes, she was the new-coming upshot replacing his old wife. The other girlfriends were therefore her direct competition.
She might also have, rather suddenly, realized how meaningless all his love-assurances were. That can really hurt.
Go to jail AND lose your divorce case (Score:4, Insightful)
Sure, you may uncover evidence of unfaithfulness in your divorce case, but your winnings in divorce case will be offset when you go to jail for computer trespass and the victim [your ex] sues the invader [you] for mega-bucks.
Oh, and if you tell your lawyer where you got the goods, it will trigger HIS ethical obligations. Yes, lawyers have ethical obligations, even those with no ethics.
Re: (Score:2)
I wonder if in a case like this, the ex can make up where he/she found the info, to hide the real source. For example, it could be claimed that the passwords were gleaned through a keylogger or a hidden camera. Unless the other attorney knows what questions to ask, there would not
Re: (Score:2)
Doesn't matter where the ex got the password -- taped to the monitor or whatever, it's still unauthorized access to a computer system.
Password hints (Score:5, Funny)
What is your girlfriend's name? Let's see the wife try to guess that one.
Re: (Score:2)
What is your girlfriend's name? Let's see the wife try to guess that one.
Her name is Alberta, she lives in Vancouver, she cooks like my mother and, um, other stuff.
Re: (Score:2)
I wonder how many people use "ElizaDushku" as a password.
Double Standards... (Score:5, Interesting)
How to secure against this (Score:4, Insightful)
There are two ways an advisory can obtain one's password:
The first attack can be countered by using Gmail with things set up to always use https for connections (near the bottom of the "settings" page).
The second attack can be countered by using a secure password that is easy to remember but hard to guess. For example, "MaraDNS.org" would not be a very good password for this account, however "otif10md" ("One time I fell 10 meters down") would be a good password. Or, in my case, I use a secure hashing algorithm where a common secret is concatenated with the name of the website I visit to get a secure password, akin to using the Md5 sum of "This is secret;slashdot.org" to get a password.
Re: (Score:2, Insightful)
Yes, but you have to take into consideration that if the company was real, they wouldn't be operating locally. They'd be operating remotely. Which pretty much rules the former situation out.
Also, I was convinced that SSL was the de-facto standard for GMAIL and other web-mail services...
As I said in my previous post, it has been reported that the 'hackers' are merely scamming peoples money (as expected) and not delivering the service.
Re: (Score:2)
> all your email is transferred is in the open unless you understand to check
> the box...
Or simply bookmark as https://mail.google.com/ [google.com] in which case the entire
session is SSL'ed anyway. The extra setting to "Always use HTTPS" does help to
make sure.
Re: (Score:2)
Or, in my case, I use a secure hashing algorithm where a common secret is concatenated with the name of the website I visit to get a secure password, akin to using the Md5 sum of "This is secret;slashdot.org" to get a password.
I'm curious. Assuming your attacker knows that you use a common hash (and can easily guess which one), what do you gain over just using "secretpassword;slashdot.org?" If the attacker was going to use a dictionary attack, it would require the same number of guesses with and without the hash (or perhapse a measily 5 or 10x if the attacker has to try several hashing algorithms).
Re: (Score:2)
Because if someone finds that your slashdot password is "25bf4e9796" it doesn't really help them work out that your amazon password is "ebf97d7aa8".
But you only need to remember one password, hopefully a slightly better one than that example...
And of course you would not usually use the actual md5 sum hex output, you'd use an encoding that gives you more than 4 bits per byte and manages meet the usual password restrictions.
Re: (Score:2)
The first attack can be countered by using Gmail with things set up to always use https for connections (near the bottom of the "settings" page).
Gmail always encrypts your password; that setting only applies to the rest of the connection (i.e. transferring the body of your email and such).
ha (Score:2, Funny)
How do they work? (Score:5, Interesting)
If you're curious how these things work, here's a write-up of a typical example of one of these services [mcgrewsecurity.com].
Re: (Score:2)
Wow, that's an incredibly lame way to get someone's password.
I'm betting people fall for it, too.
I don't like snoopers! (Score:2)
Re: (Score:2)
"Some folks really need to get a life, if they feel they have to snoop on their significant other like this."
Pre-emptive snooping is a bit much, but when an SO turns evil then all bets are off. After that, all that matters is self-defense and not the enemy.
Crime for profit a misdemeanor? (Score:2)
Ok, so I can see how Joe/Jane Sixpack, getting their divorce, might only be a misdemeanor breaking into an email account without profiting from it (maybe just to do something mean to his/her ex, or dig up incriminating emails), but, with regards to these commercial services offering to do the hacking for a fee, isn't there some sort of statute which makes *any crime* which is done *for profit* a felony? I don't care if your hacking an email account is just a misdemeanor, but if you are doing it for hire, th
Re: (Score:2)
RTFS (Score:5, Insightful)
Actually, web-based, free emails could be remarkably secure, if people weren't such morons about passwords.
Re:RTFS (Score:4, Funny)
Re: (Score:2)
Re:RTFS (Score:5, Insightful)
Actually, web-based, free emails could be remarkably secure, if people weren't such morons about passwords.
I'd imagine it has more to do with those damn required "Security Questions", many of which use publicly available information.
Even the services which allow you to specify the question and answer are probably no match for a cracker working in conjunction with an Ex.
I'd be more worried about what the crackers do with the knowledge they acquire as far as your other accounts are concerned, sure they may hack the e-mail account for you, but they're just as likely to clear out your bank account afterwords.
Re:RTFS (Score:4, Insightful)
Re:RTFS (Score:5, Funny)
"Hello, Student Loans Company, do you have a reference number?"
"Yes, L238BNM"
"Could you tell me the fourth letter of your mother's maiden... hmm... I'm sorry sir, I think there's a problem with the system, please--"
"Is it a hash symbol?"
"Er... yes. And the first letter of your first pet's name?"
"The number 8"
"That's correct."
Re: (Score:3, Funny)
If I ever found a female customer service rep that knew what a "hash" is I'd drop a marriage proposal on the spot.
What if she knew what an octothorpe was?
Re:RTFS (Score:4, Funny)
Here is a sample of the kinds of answers that I am thinking about using. Of course, those are not the actual imaginary answers which I will be using. I will not tell any of my future girlfriends or my imaginary answers. These are roughly the types of answers that I might decide to use.
My mother's maden name was Van Bopeep-Tinkerbell.
I was born on Booth Island in Antartica.
I graduated from Elephant Island Prep School in Antartica.
My favorite place is Needles, California.
My first dog was a pitbull/timberwolf mix named Fluffy-foofoo Jr.
My first car was a 1923 model E Doble Steam car.
My favorite food is road-kill packrat stew.
My favorite color is infra-red.
Of course passwords should not be something too easy to guess. Personally, I prefer to use the first letter from each word in a short sentence, to create a pass phrase. To make the pass phrase easier to memorize, I try to make the sentence as humorous or bizarre and easy to visualize as possible. If it rhymes, so much the better. If punctuation is allowed in the password, I have also found an easy to remember trick on how to include a few punctuation symbols, as well as mixing in both upper and lower case letters. Just in case I ever forget, I keep a short backup list of those in my safety deposit box at the bank.
By the way, I still use an old-fashioned pop type email account instead of an web-based email account.
Re: (Score:2)
I have recently stopped using real answers to those required "Security Questions." The answers to many of those questions are already known by other people and could probably also be found on the Internet. Instead, I plan to memorize a list of some imaginary answers for those kinds of questions.
This is of course the only way to use those "security" questions. I'm troubled that there still are so few people thinking out of the box nowadays even with the high profile hacks widely published in the popular press.
The few sites that store both your question and your answer help a bit.
Re: (Score:2)
Re: (Score:2)
Must be some cracker to guess some of those security answers. *I* can't remember my own answers. "What was your favorite food (when you created this account 5 years ago)?" Ugh. For trivial accounts I started typing "IHateYou" as the response for all of them. (Yeah, I told my big secret. Now you can go try to crack my Adobe.Com account so you can download Adobe Acrobat 1000 times or something.)
Re: (Score:2)
> I'd imagine it has more to do with those damn required "Security Questions",
> many of which use publicly available information.
While I agree, that those questions are stupid, I do not agree, that they "use
publicly available information". Your answer does, if at all. And that's
your choice. So treat the answers just as another password. What's your
highschool? EswB2aal!
Re: (Score:3, Funny)
So, if you forget your password, you recover it with another password that you can't remember?
Re: (Score:2)
That's bitten me once -- and only once -- since I started doing it.
My bank requires security questions.
It then picks a random security question when I login, as part of their wish-it-was two-factor [thedailywtf.com] authentication scheme.
Re: (Score:3, Informative)
and that's a good point.
It seems that passwords are kind of a terrible way to secure things.
Needs more OpenID, client certificates, and HTTPS
Re: (Score:2)
Re: (Score:3, Funny)
... a good reason to keep your lover gruntled.
Re: (Score:2, Funny)
Re: (Score:3, Interesting)
What I'd like to see would be more ability to use a standardized keyfob (such as RSA's SecurID), a smart card that has one's client certificate, or perhaps both in one device like the Aladdin eToken NG-OTP. Combine this with some type of decentralized but usable authentication system like OpenID, and this would go a long way to making bad or guessed passwords a thing of the past.
Smart cards go a long way to ease authentication hassles, but they bring their own issues, such as card lockouts due to too many
Re:RTFS (Score:4, Interesting)
Several UK banks use the EMV card (branded as "Chip+PIN" here (wiki it), a debit/credit card with a chip) for authentication with online banking. The readers don't connect to a computer, and getting the PIN wrong three times in the portable reader only means you need to reset the card by using it in an ATM.
The trouble is, it's been done cheaply, and has some *big* problems. Ignoring problems with encryption, the biggest one is a social problem: I have a small card reader. I can put one of my debit/credit cards in, press "Identify", type in my PIN, and get the message "PIN OK" and a code. Fine, I can put the code in the online banking website to authenticate.
The problem is, if I get the PIN wrong, the message says "PIN incorrect", and no code is produced. Argh! Introducing the chips has drastically cut face-to-face (shop, ATM) fraud in the UK, and means criminals now want a PIN to go with a card. They sometimes install a tiny camera in an ATM and steal the card when you walk away, but ATMs are in "safe" places, and have CCTV around them etc -- or at least, people don't use them if they don't feel safe.
So instead, they steal your card somewhere more private:
*thump* *thump* "Tell me the PIN!"
"5-2-9-1! Let me go!"
*"Identify"* *tap-tap-tap-tap* *schking* "Tell me the real PIN, or else!"
Comment removed (Score:5, Insightful)
Re: (Score:3, Interesting)
I am not allowed to save them. I must memorize them.
Nonsense. While Chrome doesn't seem to have this yet, Firefox and Konqueror come with encrypted password stores out of the box.
That is, you enter one master password, and it then remembers all your passwords for you.
I also have a friend who wrote a Firefox extension, which I'm seriously considering replicating (or finding, if he ever published it), which would take one master password that he'd remember, combine it with the domain, and computer a hash. Thus, nothing is ever stored, but there's still only on
Re: (Score:3, Insightful)
Re: (Score:2)
Sure. That is what people tell me all the time to use a secure password. http://maord.com/ [maord.com] can easily help you with that. So now I have a secure password like cJQKUG4P generated by that website.
Those passwords are terrible they should have some non alphabetical characters, like punctuation, to be more effective.
When will PAM finally support Unicode passwords for Linux (and how do you enter runes on this stupid keyboard ?)
Re: (Score:2)
Re: (Score:2)
How do these web-mails work at repeated login attempts?
"Kill" the account?
Kill attempts from that IP?
Kill attempts for a limited time?
What about if the attempts come from several different IPs (but more or less at the same time)?
If designed well even easy-to-remember-but-not-totally-trivial passwords can be very hard to crack.
I agree the security questions are a bad idea, unless they have much faster "kill switch".
Re:So wait... (Score:5, Insightful)
You mean people actually still think that web-based, free emails are secure?
As opposed to a client-based email, where you can simply get it all through the filesystem? Physical access is game-over. So if you have 30min with your ex's machine, that's pretty much game over, if residing in clients.
Re: (Score:2)
Well, if you have 2 minutes with your ex's machine, chances are either they're already logged into their webmail, or their password is saved.
Re: (Score:2)
Well, if you have 2 minutes with your ex's machine, chances are either they're already logged into their webmail, or their password is saved.
Frankly, if you have an ex (or an SO for that matter), chances are she/he already gave you that password anyway because you had to fix her/his broken machine more than once. Or you are her/his email provider and already have access to it without password. So that whole conversation is kind of silly to begin with (for tech people anyway).
Re: (Score:2)
You mean people actually still think that web-based, free emails are secure?
As opposed to a client-based email, where you can simply get it all through the filesystem? Physical access is game-over. So if you have 30min with your ex's machine, that's pretty much game over, if residing in clients.
I had no problem getting my ex-girlfriend's email ... after all, it was residing on my server. As it happened, the only interest I had in it was getting rid of it to reclaim some disk space (the girl didn't understand that you're supposed to delete things now and then.)
Re: (Score:2)
Jesus Christ you had your GF's mail on your server? I run my own mail server too, never felt comfortable doing that. I run mail for a couple friends, never been tempted to look and wouldn't look if I was tempted, but I would never give myself that kind of access to someone I was screwing, and besides, what happens when you break up? I guess she lost her e-mail address?
I guess you don't have to worry about things like that when you're ScrewMaster though.
Re: (Score:2)
Jesus Christ you had your GF's mail on your server? I run my own mail server too, never felt comfortable doing that. I run mail for a couple friends, never been tempted to look and wouldn't look if I was tempted, but I would never give myself that kind of access to someone I was screwing, and besides, what happens when you break up? I guess she lost her e-mail address?
I guess you don't have to worry about things like that when you're ScrewMaster though.
Well, I'm just point-blank not interested in anything that doesn't concern me. Really, I hate nosy people and I take great pains not be be one of them. So yes, I do take my privacy seriously, but that means I need to take others' seriously as well. Everything on my server is encrypted anyway, so I couldn't read it even if I wanted to. I didn't and I don't.
And no, she didn't lose her email address until she told me she didn't need it anymore. Just because she was a psychotic witch was no reason for me to
Re:So wait... (Score:4, Informative)
Re: (Score:3, Informative)
And of course, this is missing the obvious point that a) most people have never heard of truecrypt, and b) most girlfriends/boyfriends/spouses won't know that such a thing as a keylogger exists. It's true that either situation *could* change (the girlfriend gets a new boyfriend, or just a friend, who teaches her about keyloggers, for example).
Still, I suspect setting up a TC volume for your email is better than nothing. I've done this on my laptop - mostly just to protect my files in case of theft/loss; I t
Re: (Score:2)
Solution: date technically inept people.
They usually smell better anyway.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Revenge? Pettiness? Still in love? Take your pick of anything including 200 other odd reasons. Love is the most dangerous emotion you have to deal with, and it's the same emotion that makes people safe and secure. While making them do stupid, and insane things that will get them locked up for a very long, long time.
Re: (Score:2)
No, they just have to visit Slashdot, where geeks brag about their "unbreakable" passwords.
(Note: to avoid any unsightly "whoosh" moments, I know that that isn't really his password. It's a joke, people!)
Re: (Score:2)
Re: (Score:2)
*cricket noise*
Re: (Score:2)
That's what I'm wondering, actually. As a Gmail user with a relatively long and complicated password, how would these services go about hacking into my Gmail account? All connections in and out are SSL'd, I don't use public WiFi without a VPN, my home WiFi is secured relatively well... Short of e-mailing me a trojan, what options do these guys have?
Re: (Score:3, Insightful)
That's what I'm wondering, actually. As a Gmail user with a relatively long and complicated password, how would these services go about hacking into my Gmail account? All connections in and out are SSL'd, I don't use public WiFi without a VPN, my home WiFi is secured relatively well... Short of e-mailing me a trojan, what options do these guys have?
Your password may be long and complicated, but examine closely at your "security questions." If the client has been lubing your junk, odds are that she knows your dog's name is Archibald and your favorite color is mauve.
"Forgot my password" indeed.
Re: (Score:2)
One system I've thought of for security questions requires a simple app on a cellphone. App asks for a password, then when you type in what it wants for a security question, it SHA-256 hashes the question + the password [1], drops all but the first x characters, and then you use the x (10+ depending on the system, preferably 15-20) amount of characters in the result as the answer.
This way, its easy to have your answer to security questions, you can enter almost anything in for the question, but yet nobody
Re: (Score:2)
True. If you forget the "seed" password, then you are cooked. However, if you have the PW and application (which can just be a script that does 'echo "mypasswordmychallengephrase"|md5sum"' (where mypassword is your core password, and mychallengephrase is your challenge question), and paste in the hash), you can pretty much enter anything for the challenge questions and it will be unguessable to an attacker.
Re: (Score:2)
I forgot to mention that I don't use security questions ;)... if an answer is required, I just enter gibberish.
Re: (Score:2)
I keep having people hit up my Gmail account with lost password queries, usually about 3-4 times a week. Even though those mails are routed to a junk mailbox designed for that, all it would take is accidently clicking on one of the recovery links to lose control of the account.
I do wish Gmail would have an option to require someone trying to obtain a gmail password to pass the challenge/response questions before it sends a link to recover. This isn't foolproof, but it will keep Joe Skiddy from being able
Re: (Score:2)
> As a Gmail user with a relatively long and complicated password, how would
> these services go about hacking into my Gmail account?
Inside source?
Re: (Score:3, Informative)
Heh, you're over estimating the level of skill involved.
There are some interesting discussions of how these services work here:
crackpal.com [mcgrewsecurity.com]
crackmails.net [mcgrewsecurity.com]
Re: (Score:2)
Re: (Score:2)
> put something so juicy in a bogus email that an obsessed ex-lover reading it
> would be likely to act on the information--say, a fake date at a time and
> place--if your stalker ex "happens by," s/he is probably reading your email.
Somebody that obsessed might just kill you if they found something 'so juicy'.
Remember...somebody going so far as to gain unauthorized access to your
account and perusing your mail already has some serious mental problems
(though it will never occur to them as, of course, e