Month: July 2016
KickassTorrents’ Connections to the US Doomed the Site
Following the shutdown of KickassTorrents, the next pretenders to the torrent throne will be weighing up the pros and cons of pirate life. There are lessons to be learned for those willing to take the risk, but can any setup be truly bullet-proof when challenged by the US Government?
Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.
To the huge disappointment of millions of BitTorrent users, KickassTorrents disappeared this week following an investigation by the Department of Homeland Security in the United States.
With a huge hole now present at the top of the torrent landscape, other sites plus interested groups and individuals will be considering their options. Step up their game and take over the top slot? Cautiously maintain the status quo? Or pull out altogether…
Make no mistake, this is a game of great reward, matched only by the risk. If the DHS complaint is to be believed, Kickass made dozens of millions of euros, enough to tempt even the nerviest of individuals. But while that might attract some, is avoiding detection almost impossible these days?
The complaint against KAT shows that while not inevitable, it’s becoming increasingly difficult. It also shows that carelessness plays a huge part in undermining security and that mistakes made by others in the past are always worth paying attention to.
Servers in the United States
Perhaps most tellingly, in the first instance KAT failed to learn from the ‘mistakes’ made by Megaupload. While the cases are somewhat dissimilar, both entities chose to have a US presence for at least some of their servers. This allowed US authorities to get involved. Not a great start.
“[Since 2008], KAT has relied on a network of computer servers around the world to operate, including computer servers located in Chicago, Illinois,” the complaint against the site reads.
The Chicago server weren’t trivial either.
“According to a reverse DNS search conducted by the hosting company on or about May 5, 2015, that server was the mail client ‘mail.kat.ph’.”
Torrent site mail servers. In the United States. What could go possibly go wrong?
In a word? Everything. In January 2016, DHS obtained a search warrant and cloned the Chicago servers. Somewhat unsurprisingly this gifted investigating agent Jared Der-Yeghiayan (the same guy who infiltrated Silk Road) valuable information.
“I located multiple files that contained unique user information, access logs, and other information. These files include a file titled ‘passwd’ located in the ‘etc’ directory, which was last accessed on or about January 13, 2016, and which identified the users who had access to the operating system,” Der-Yeghiayan said.
Servers in Canada
KAT also ran several servers hosted with Montreal-based Netelligent Hosting Services. There too, KAT was vulnerable.
In response to a Mutual Legal Assistance Treaty request, in April 2016 the Royal Canadian Mounted Police obtained business records associated with KAT’s account and made forensic images of the torrent site’s hard drives.
Why KAT chose Netelligent isn’t clear, but the site should have been aware that the hosting company would be forced to comply with law enforcement requests. After all, it had happened at least once before in a case involving Swedish torrent site, Sparvar.
Mistakes at the beginning
When pirate sites first launch, few admins expect them to become world leaders. If they did, they’d probably approach things a little differently at the start. In KAT’s case, alleged founder Artem Vaulin registered several of the site’s domains in his own name, information that was happily handed to the DHS by US-based hosting company GoDaddy.
Vaulin also used a Gmail account, operated by US-based Google. The complaint doesn’t explicitly say that Google handed over information, but it’s a distinct possibility. In any event, an email sent from that account in 2009 provided a helpful bridge to investigators.
“I changed my gmail. now it’s admin@kickasstorrents.com,” it read.
Forging further connections from his private email accounts to those operated from KAT, in 2012 Vaulin sent ‘test’ emails from KAT email addresses to his Apple address. This, HSI said, signaled the point that Vaulin began using KAT emails for business.
No time to relax, even socially
In addition to using an email account operated by US-based Apple, (in which HSI found Vaulin’s passport and driver’s license details, plus his banking info), the Ukranian also had an iTunes account.
Purchases he made there were logged by Apple, down to the IP address. Then, thanks to information provided by US-based Facebook (notice the recurring Stateside theme?), HSI were able to match that same IP address against a login to KAT’s Facebook page.
Anonymous Bitcoin – not quite
If the irony of the legitimate iTunes purchases didn’t quite hit the spot, the notion that Bitcoin could land someone in trouble should tick all the boxes. According to the complaint, US-based Bitcoin exchange Coinbase handed over information on Vaulin’s business to HSI.
“Records received from the bitcoin exchange company Coinbase revealed that the KAT Bitcoin Donation Address sent bitcoins it received to a user’s account maintained at Coinbase. This account was identified as belonging to Artem Vaulin located in Kharkov, Ukraine,” it reads.
Final thoughts
For a site that the US Government had always insisted was operating overseas, KickassTorrents clearly had a huge number of United States connections. This appears to have made the investigation much more simple than it would have been had the site and its owner had maintained a presence solely in Eastern Europe.
Why the site chose to maintain these connections despite the risks might never be answered, but history has shown us time and again that US-based sites are not only vulnerable but also open to the wrath of the US Government. With decades of prison time at stake, that is clearly bad news.
But for now at least, Vaulin is being detained in Poland, waiting to hear of his fate. Whether or not he’ll quickly be sent to the United States is unclear, but it seems unlikely that a massively prolonged Kim Dotcom-style extradition battle is on the agenda. A smaller one might be, however.
While the shutdown of KAT and the arrest of its owner came out of the blue, the writing has always been on the wall. The shutdown is just one of several momentous ‘pirate’ events in the past 18 months including the closure (and resurrection) of The Pirate Bay, the dismantling of the main Popcorn Time fork, and the end of YTS/YIFY.
Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.
Die Woche im Video: Ausgesperrt, aufgehängt, aufgegeben
Mittelsmarte Türschlösser, Tablets an der Wand und Grafikkarten im Wettstreit: Wir hatten diese Woche viele Geräte in der Hand. Musk hat einen Masterplan – und Unister kein Geld mehr. Sieben Tage und viele Meldungen im Überblick. (Golem-Wochenrückblick, USB 3.0)
KickassTorrents Owner Arrested, Domain Seized
The world’s largest torrent site has been taken offline by a multi-national law enforcement action, with the owner of the site now facing extradition and criminal sanction in the United States.KickassTorrents (KAT) surpassed The Pirate Bay as the world…
The world's largest torrent site has been taken offline by a multi-national law enforcement action, with the owner of the site now facing extradition and criminal sanction in the United States.
KickassTorrents (KAT) surpassed The Pirate Bay as the world's most popular pirated torrent directory, and while past efforts have managed to take the site offline, or force it to move to a different domain name, the site remained active and growing. Until last week, that is, when the U.S. government seized the site's domain names, and Polish authorities arrested the Ukrainian owner of the site, 30-year-old Artem Vaulin.
Vaulin now faces extradition to the U.S. where he faces criminal sanctions for enabling, as the U.S. government alleges, over $US1 billion in damages relating to copyright infringement.
Authorities appears to have obtained vast amounts of data in the seizures, including full copies of KAT's hard-drives. With so much seized, it could make a comeback for KAT impossibly hard, although many mirrors and impostors have since sprung up to either support KAT, or to take advantage of the situation.
With authorities in possession of vital data, users and uploaders to the site could also face further criminal actions, as the full implication of one of the biggest piracy take-downs in history is yet to be felt.
[via TorrentFreak]
Cyanogen Inc. reportedly fires OS development arm, switches to apps
What happens to an Android OS company when it stops developing an Android OS?
Cyanogen Inc. seems to be in trouble. A report from Android Police cites "several sources" that say the three-year-old Android software house will be laying off 20 percent of its workforce. One source said the company would "pivot" to "apps" and away from OS development.
"Cyanogen" branding can be confusing, so here's a quick glossary before we get started:
- Cyanogen—A person. Steve Kondik. The guy that originally started CyanogenMod.
- CyanogenMod—A free, open source, OS heavily based on Android and compatible with hundreds of devices. Anyone can download and flash the OS to a compatible device.
- Cyanogen OS—A for-profit OS that OEMs can purchase and ship on devices. It's the CyanogenMod codebase with some proprietary features on top and update support from Cyanogen Inc.
- Cyanogen Inc.—A for-profit company that aims to sell Cyanogen OS to OEMs. Formed with key members from the open-source project.
- Cyanogen Mods—Cyanogen Inc.'s proprietary app platform for Cyanogen OS.
The Android Police report says "roughly 30 out of the 136 people Cyanogen Inc. employs" are being cut, and that the layoffs "most heavily impact the open source arm" of the company. Android Police goes on to say that CyanogenMod development by Cyanogen Inc "may be eliminated entirely." The community could continue to develop CyanogenMod, but it seems many of the core CyanogenMod developers at the company will no longer be paid to work on CyanogenMod.
Report: Cyanogen Inc could shift from operating system to apps
It’s been nearly three years since a group of CyanogenMod developers announced they were forming a company to take what they’d learned about developing custom ROMs for Android and create a commercial Android-based operating system that phone makers could license.
Now it looks like Cyanogen Inc may be making some major changes.
Android Police reports the company is laying off about 20 percent of its workforce and considering a shift in strategy that could have the company producing Android apps rather than operating systems.
Continue reading Report: Cyanogen Inc could shift from operating system to apps at Liliputing.
It’s been nearly three years since a group of CyanogenMod developers announced they were forming a company to take what they’d learned about developing custom ROMs for Android and create a commercial Android-based operating system that phone makers could license.
Now it looks like Cyanogen Inc may be making some major changes.
Android Police reports the company is laying off about 20 percent of its workforce and considering a shift in strategy that could have the company producing Android apps rather than operating systems.
Continue reading Report: Cyanogen Inc could shift from operating system to apps at Liliputing.
Malicious computers caught snooping on Tor-anonymized Dark Web sites
Misbehaving hidden service directories are scattered around the world.
The trust of the Tor anonymity network is in many cases only as strong as the individual volunteers whose computers form its building blocks. On Friday, researchers said they found at least 110 such machines actively snooping on Dark Web sites that use Tor to mask their operators' identities.
All of the 110 malicious relays were designated as hidden services directories, which store information that end users need to reach the ".onion" addresses that rely on Tor for anonymity. Over a 72-day period that started on February 12, computer scientists at Northeastern University tracked the rogue machines using honeypot .onion addresses they dubbed "honions." The honions operated like normal hidden services, but their addresses were kept confidential. By tracking the traffic sent to the honions, the researchers were able to identify directories that were behaving in a manner that's well outside of Tor rules.
"Such snooping allows [the malicious directories] to index the hidden services, also visit them, and attack them," Guevara Noubir, a professor in Northeastern University's College of Computer and Information Science, wrote in an e-mail. "Some of them tried to attack the hidden services (websites using hidden services) through a variety of means including SQL Injection, Cross-Site Scripting (XSS), user enumeration, server load/performance, etc."
Cable lobby set-top offer: No DVR requirement, no more compromises
FCC demanded answers from cable lobbyists about set-top box counter-proposal.
The cable industry's primary lobby group has provided more details on its counter-proposal to the Federal Communications Commission's set-top box plan, and there's at least one thing cable TV customers won't like.
A 33-page filing from the National Cable & Telecommunications Association (NCTA) responds to questions sent by the FCC. Among other things, the FCC asked whether the cable industry will pledge to make DVR (digital video recording), fast forwarding, and rewinding available on third-party devices, but the NCTA did not propose that cable companies meet this standard.
The NCTA said customers won't have to pay extra for using third-party apps and boxes but left the door open for other methods of jacking up customers' prices.
Samsung countersues Huawei, as tit-for-tat patent disputes expand to China
Patent wars among smartphone companies aren’t over. They may be spreading.
Once upon a time, big tech companies assiduously avoided patent lawsuits. The possibility of "mutually assured destruction" that would come from an endless cycle of suit and countersuit scared them too much.
But several years ago, that fear faded away. In the wake of cases like Apple v. Samsung, massive legal bills have sometimes become worth paying in order to gain an edge over a competitor.
A fast-growing fight between Samsung and Huawei suggests that the next generation of patent disputes won't be limited to the US and Europe. China-based Huawei, the third-largest seller of smartphones, sued Samsung this year in both US and Chinese courts.
This $150 case puts Android on an iPhone’s screen
Say you’re a fan of Android, but all your friends and family use Facetime. You could carry around two phones… or you could buy a custom smartphone case that allows you to run both operating systems on a single phone. Kind of.
The MESUIT is an iPhone case that has the guts of an Android device. Connect it to an iPhone’s lightning port, run an app on the iPhone and you can interact with Android apps on your iPhone.
Continue reading This $150 case puts Android on an iPhone’s screen at Liliputing.
Say you’re a fan of Android, but all your friends and family use Facetime. You could carry around two phones… or you could buy a custom smartphone case that allows you to run both operating systems on a single phone. Kind of.
The MESUIT is an iPhone case that has the guts of an Android device. Connect it to an iPhone’s lightning port, run an app on the iPhone and you can interact with Android apps on your iPhone.
Continue reading This $150 case puts Android on an iPhone’s screen at Liliputing.
You must be logged in to post a comment.