Hacker News new | past | comments | ask | show | jobs | submit login

You might find this book interesting. http://www.amazon.com/Kingpin-Hacker-Billion-Dollar-Cybercri...

I've read it and can confirm its a good read. I think this guy was arrested in 2005 or 2007 but that's going on memory from over a year ago.




Good, entertaining read. I get the impression it was sanitized a great deal, because I was sorely disappointed with the lack of technical meat-n-potatoes.

For instance, the author totally glossed over how they recovered the data from his encrypted storage at the end. Was the PC left on and the screen not locked? Cold boot attack? Brute force? Hell, they didn't even specify exactly which crypto software was used.


He fell asleep while he left his servers on. So they simply siphoned the keys from memory. He used some proprietary Israeli made encryption software and FreeBSD, but it didn't matter because everything including Truecrypt keeps your keys in memory when mounted.

Even if his server was off, they could have broken into his safehouse and sabotaged the unencrypted bootloader. Only defense against this is use OpenBSD 5.3 which allows booting from fully encrypted drives, or keep your unencrypted boot partition on a usb stick you carry around.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: