SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
De-anonymizing Users of
French Political Forums
Dominique Bongard
CEO and janitor,
0xcite LLC, Switzerland
dominique.bongard@0xcite.ch | @reversity | www.0xcite.ch
What is Gravatar and how does it work
Privacy attacks on Gravatar
A practical example with political forums
A little something about me
Part 0
§  French speaking Swiss citizen
§  Reverse Engineer
§  Specialized in embedded devices security
What is Gravatar and how
does it work
Part 1
§  Service which allows members of forums and blogs to automatically
have the same profile picture on all participating sites
§  Uses the MD5 hash of a person‘s email address as identifier
§  Gravatar is owned by Automattic
§  It is used by several major sites
§  Used for users who haven‘t registered an avatar
§  Site administrators can also set a custom image
§  MD5 hashes are also displayed for users who didn‘t
register with Gravatar!
Privacy attacks on Gravatar
Part 2
matt.mullenweg@automattic.com 58f266c26cd28643c9f3ae42c858dfe5!
mullenweg@automattic.com 9a68676b220b1357308951c3ce0b3911!
matt@automattic.com c0ccdd53794779bcc07fcae7b79c4d80!
§  Use a password cracking software like Hashcat
§  In 2008 Abell of developer.it recovered 10% of the email
addresses of 80’000 stackoverflow.com users1
§  The attack was played down with the following arguments
§  Spam is not the main issue, privacy protection is
1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
"MD5 is plenty good for obfuscating the email address of users
across the wire. if you're thinking of rainbow tables, those are all
geared at passwords (which are generally shorter, and less globally
different from one another) and not email addresses, furthermore
they are geared at generating anything that matches the hash, NOT
the original data being hashed. If you are thinking about being able to
reproduce a collision, you still don't necessarily get the actual email
address being hashed from the data generated to create the collision.
In either case the work required to both construct and operate such a
monstrocity would be prohibitively costly. If we left your password
laying around in the open as a plain md5 hash someone might be
able to find some data (not necessarily your password) which they
could use to log in as you... Leaving your email address out as an
md5 hash, however, is not going to cause a violent upsurge in the
number of fake rolex watch emails that you get. Lets face it there are
far more lucrative, easier, ways of getting email address. I hope this
helps ease your mind."
§  Yes emails are longer than passwords but:
§  Email addresses are highly predictable
§  GPU password crackers can try billions MD5 per second
A practical example with
political forums
Part 3
The current political context
in France
§  Presided by François Hollande since 2012
§  Left wing social democrat (Parti Socialiste)
§  Lowest satisfaction rate for a French President
§  Same sex marriage
§  Surrogacy laws (GPA)
§  Assisted Reproductive Technology laws (PMA)
§  Voting rights for immigrants
§  One radical left wing activist was killed during a fist fight1
§  Ordinary people and journalists often get sued for
§  You may lose your job for displaying you opinions
§  It can also get you harrased or physically attacked
§  Eric Zemmour is a right wing polemist
§  He said this in the context of racial profiling by police
§  He was sentenced to pay 2000 Euros for provoking
racial hatred
De-anonymisation of French
political forums’ members
§  Members of such forums mostly use pseudonyms
§  They have a high expectation of privacy
§  Some savy posters register with disposable addresses
§  The identity of many users can easily be discovered
§  The authorities can obtain the user‘s identity with a court
order to the email provider
§  A political adversary can spearfish the users
Practical example of
de-anonymisation
§  The main French political forum uses Gravatar
§  The identity of its administator is suspected but not proved
§  A custom crawler was written to acquire MD5 hashes
§  A beta version of Hashcat was used to crack the hashes
§  45% of the email addresses were recovered
§  Mask up to 9 characters for the left side
§  Various left side dictionaries
§  Right side dictionaries of popular email domains
§  A few other rules
gmail.com live.fr
aol.com yahoo.fr
gmx.fr yahoo.com
hotmail.com ymail.com
hotmail.fr outlook.com
laposte.net bluewin.ch
msn.com voila.fr
aliceadsl.fr cegetel.net
club-internet.fr infonie.fr
libertysurf.fr neuf.fr
noos.fr numericable.fr
orange.fr sfr.fr
laposte.net wanadoo.fr
get2mail.fr mailinator.com
yopmail.fr yopmail.com
ymail.com *
0
50
100
150
200
250
300
Addresses containing username: 13%
Addresses containing numbers: 34%
Addresses ending in numbers: 32%
Addresses containing punctuation: 13%
Addresses containing a dot: 8%
Addresses containing an underscore: 3%
Addresses containing a dash: 1.7%
Addresses with punctuation and numbers: 4%
§  ....
De-anonymizing Members of French Political Forums - Passwords13

Contenu connexe

En vedette

Human Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеровHuman Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеровАлена Лысак
 
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014 Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014 Алена Лысак
 
610o la promoción internacional de las universidades actores e instrumentos
610o   la promoción internacional de las universidades actores e instrumentos610o   la promoción internacional de las universidades actores e instrumentos
610o la promoción internacional de las universidades actores e instrumentosUniversidad Internacional Menendez Pelayo
 
INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION Ninfi Moreno
 
CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014Ayuntamiento Benissa
 
- og vi gør tingene færdige
- og vi gør tingene færdige- og vi gør tingene færdige
- og vi gør tingene færdigeRobert Herbers
 
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]RootedCON
 
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTETALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTEMaribel Garcia
 
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...Soluciona Facil
 
Programa preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAPPrograma preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAP17CongresoSefap
 
Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010Federico Pensa
 
ADCI Report Q4 2015
ADCI Report Q4 2015ADCI Report Q4 2015
ADCI Report Q4 2015Sewells MSXI
 

En vedette (20)

Human Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеровHuman Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеров
 
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014 Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
 
FOTO Produccion
FOTO ProduccionFOTO Produccion
FOTO Produccion
 
610o la promoción internacional de las universidades actores e instrumentos
610o   la promoción internacional de las universidades actores e instrumentos610o   la promoción internacional de las universidades actores e instrumentos
610o la promoción internacional de las universidades actores e instrumentos
 
INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION
 
Flyer interplay radar_0811
Flyer interplay radar_0811Flyer interplay radar_0811
Flyer interplay radar_0811
 
Santiago duran
Santiago duranSantiago duran
Santiago duran
 
CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014
 
Concierto por la Paz - Paco Padilla
Concierto por la Paz - Paco PadillaConcierto por la Paz - Paco Padilla
Concierto por la Paz - Paco Padilla
 
- og vi gør tingene færdige
- og vi gør tingene færdige- og vi gør tingene færdige
- og vi gør tingene færdige
 
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
 
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTETALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
 
PR und Social Media
PR und Social MediaPR und Social Media
PR und Social Media
 
Tdah y trastornos del sueño
Tdah y trastornos del sueñoTdah y trastornos del sueño
Tdah y trastornos del sueño
 
Aumentame2013
Aumentame2013Aumentame2013
Aumentame2013
 
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
 
Programa preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAPPrograma preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAP
 
Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010
 
ADCI Report Q4 2015
ADCI Report Q4 2015ADCI Report Q4 2015
ADCI Report Q4 2015
 
Pollay
PollayPollay
Pollay
 

Similaire à De-anonymizing Members of French Political Forums - Passwords13

How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Naga Rohit
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a passwordRob Gillen
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonMateus BahiaRicardo
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 

Similaire à De-anonymizing Members of French Political Forums - Passwords13 (20)

How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of non
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Security pre
Security preSecurity pre
Security pre
 

Dernier

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

De-anonymizing Members of French Political Forums - Passwords13

  • 1. De-anonymizing Users of French Political Forums Dominique Bongard CEO and janitor, 0xcite LLC, Switzerland dominique.bongard@0xcite.ch | @reversity | www.0xcite.ch
  • 2. What is Gravatar and how does it work Privacy attacks on Gravatar A practical example with political forums
  • 3. A little something about me Part 0
  • 4. §  French speaking Swiss citizen §  Reverse Engineer §  Specialized in embedded devices security
  • 5. What is Gravatar and how does it work Part 1
  • 6. §  Service which allows members of forums and blogs to automatically have the same profile picture on all participating sites §  Uses the MD5 hash of a person‘s email address as identifier §  Gravatar is owned by Automattic §  It is used by several major sites
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. §  Used for users who haven‘t registered an avatar §  Site administrators can also set a custom image §  MD5 hashes are also displayed for users who didn‘t register with Gravatar!
  • 12.
  • 13.
  • 14.
  • 15. Privacy attacks on Gravatar Part 2
  • 16.
  • 18. §  Use a password cracking software like Hashcat §  In 2008 Abell of developer.it recovered 10% of the email addresses of 80’000 stackoverflow.com users1 §  The attack was played down with the following arguments §  Spam is not the main issue, privacy protection is 1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
  • 19. 1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea "MD5 is plenty good for obfuscating the email address of users across the wire. if you're thinking of rainbow tables, those are all geared at passwords (which are generally shorter, and less globally different from one another) and not email addresses, furthermore they are geared at generating anything that matches the hash, NOT the original data being hashed. If you are thinking about being able to reproduce a collision, you still don't necessarily get the actual email address being hashed from the data generated to create the collision. In either case the work required to both construct and operate such a monstrocity would be prohibitively costly. If we left your password laying around in the open as a plain md5 hash someone might be able to find some data (not necessarily your password) which they could use to log in as you... Leaving your email address out as an md5 hash, however, is not going to cause a violent upsurge in the number of fake rolex watch emails that you get. Lets face it there are far more lucrative, easier, ways of getting email address. I hope this helps ease your mind."
  • 20. §  Yes emails are longer than passwords but: §  Email addresses are highly predictable §  GPU password crackers can try billions MD5 per second
  • 21. A practical example with political forums Part 3
  • 22. The current political context in France
  • 23. §  Presided by François Hollande since 2012 §  Left wing social democrat (Parti Socialiste) §  Lowest satisfaction rate for a French President
  • 24. §  Same sex marriage
  • 25. §  Surrogacy laws (GPA) §  Assisted Reproductive Technology laws (PMA) §  Voting rights for immigrants
  • 26. §  One radical left wing activist was killed during a fist fight1
  • 27. §  Ordinary people and journalists often get sued for §  You may lose your job for displaying you opinions §  It can also get you harrased or physically attacked
  • 28. §  Eric Zemmour is a right wing polemist §  He said this in the context of racial profiling by police §  He was sentenced to pay 2000 Euros for provoking racial hatred
  • 30. §  Members of such forums mostly use pseudonyms §  They have a high expectation of privacy §  Some savy posters register with disposable addresses
  • 31. §  The identity of many users can easily be discovered §  The authorities can obtain the user‘s identity with a court order to the email provider §  A political adversary can spearfish the users
  • 33. §  The main French political forum uses Gravatar §  The identity of its administator is suspected but not proved
  • 34. §  A custom crawler was written to acquire MD5 hashes §  A beta version of Hashcat was used to crack the hashes §  45% of the email addresses were recovered
  • 35. §  Mask up to 9 characters for the left side §  Various left side dictionaries §  Right side dictionaries of popular email domains §  A few other rules
  • 36. gmail.com live.fr aol.com yahoo.fr gmx.fr yahoo.com hotmail.com ymail.com hotmail.fr outlook.com laposte.net bluewin.ch msn.com voila.fr
  • 37. aliceadsl.fr cegetel.net club-internet.fr infonie.fr libertysurf.fr neuf.fr noos.fr numericable.fr orange.fr sfr.fr laposte.net wanadoo.fr
  • 39.
  • 41. Addresses containing username: 13% Addresses containing numbers: 34% Addresses ending in numbers: 32% Addresses containing punctuation: 13% Addresses containing a dot: 8% Addresses containing an underscore: 3% Addresses containing a dash: 1.7% Addresses with punctuation and numbers: 4%