September 20, 2008
Posted by on
It’s crazy the amount of blogs that have news about the Palin attack. I mean, I tried to avoid the whole thing to a point, but after briefly browsing the CTunnel site and seeing the policy I wanted to cover it from a privacy standpoint. I fully admit that I was too quick to post, and should have done a little more research. The terms of service from CTunnel is made clear on another page, that somehoy managed to slip past me. All logs are retained for 7 days. So they still have some time to act and get the logs, if the attacker didn’t use a second proxy service (and beyond).
However, this post is about something totally different.
My blog doesn’t get high levels of traffic, after all I’m not well known in the security world. I’ve never written a security book, tool, or presented at a conference. So who the hell am I. Truth is this blog was for me more than anybody else. You can learn a lot by writing about it, and I hope to learn more in the months and years to come. It just seems scary to me the amount of page views that have come my way as a result of posting the word “Palin” on my blog. It seems silly, but it’s true. If this kind of response comes from posting about Palin, then imagine the level of malicious email circulating right now using Palin as a cover story. I’m not in the loop when it comes to levels of malicious emails, but if the trend of using current events as cover for these type of mail continues then I’m sure we’ll start seeing emails using this tactic.
Keep an eye on the Internet Storm Center diary, as they’ll be the ones in the know on this.
September 19, 2008
Posted by on
It seems like everyone and there twin sisters first cousin is blogging about the breach of Palin’s email accounts. I’ve resisted so far, but wanted to touch on the latest report from the BBC that says that FBI agents are investigation the breach. As part of the news story the use of the CTunnel tool was mentioned as the anonymous proxy service used by the “hacker”. It seems that the FBI is seeking records from the people behind CTunnel in connection to the investigation.
After a quick look at the CTunnel website, I found the following text in reference to the CTunnel logging and retention of data.
“Because our visitors value their privacy, it is not in our interests to spy on you, lest we lose traffic and advertising revenue. Because government subpenoa could require us to hand over our server access logs, access logs are regularly deleted to protect your privacy. In short, we value your browsing experience as well as your anonymity, and would not do anything to break your trust in us.”
It’s not specific from this what “regularly” means, and it will be interesting to see what legal ramifications come from the use of CTunnel in this breach. If the people behind CTunnel are forced to provide all logs related to the breach, I can see people moving away from the service for fear of future privacy issues. I would be much more comfortable if CTunnel had a specific written policy that details things a little better than just “regularly”. However I’m not a customer of the service, so it’s not for me to say. However if CTunnel truly “value your browsing experience as well as your anonymity” then I’d hope they have better in-house policies than the badly worded ones listed on their website.
I guess we’ll have to watch this one as it unfolds.