SlideShare a Scribd company logo
1 of 43
Download to read offline
De-anonymizing Users of
French Political Forums
Dominique Bongard
CEO and janitor,
0xcite LLC, Switzerland
dominique.bongard@0xcite.ch | @reversity | www.0xcite.ch
What is Gravatar and how does it work
Privacy attacks on Gravatar
A practical example with political forums
A little something about me
Part 0
§  French speaking Swiss citizen
§  Reverse Engineer
§  Specialized in embedded devices security
What is Gravatar and how
does it work
Part 1
§  Service which allows members of forums and blogs to automatically
have the same profile picture on all participating sites
§  Uses the MD5 hash of a person‘s email address as identifier
§  Gravatar is owned by Automattic
§  It is used by several major sites
§  Used for users who haven‘t registered an avatar
§  Site administrators can also set a custom image
§  MD5 hashes are also displayed for users who didn‘t
register with Gravatar!
Privacy attacks on Gravatar
Part 2
matt.mullenweg@automattic.com 58f266c26cd28643c9f3ae42c858dfe5!
mullenweg@automattic.com 9a68676b220b1357308951c3ce0b3911!
matt@automattic.com c0ccdd53794779bcc07fcae7b79c4d80!
§  Use a password cracking software like Hashcat
§  In 2008 Abell of developer.it recovered 10% of the email
addresses of 80’000 stackoverflow.com users1
§  The attack was played down with the following arguments
§  Spam is not the main issue, privacy protection is
1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
"MD5 is plenty good for obfuscating the email address of users
across the wire. if you're thinking of rainbow tables, those are all
geared at passwords (which are generally shorter, and less globally
different from one another) and not email addresses, furthermore
they are geared at generating anything that matches the hash, NOT
the original data being hashed. If you are thinking about being able to
reproduce a collision, you still don't necessarily get the actual email
address being hashed from the data generated to create the collision.
In either case the work required to both construct and operate such a
monstrocity would be prohibitively costly. If we left your password
laying around in the open as a plain md5 hash someone might be
able to find some data (not necessarily your password) which they
could use to log in as you... Leaving your email address out as an
md5 hash, however, is not going to cause a violent upsurge in the
number of fake rolex watch emails that you get. Lets face it there are
far more lucrative, easier, ways of getting email address. I hope this
helps ease your mind."
§  Yes emails are longer than passwords but:
§  Email addresses are highly predictable
§  GPU password crackers can try billions MD5 per second
A practical example with
political forums
Part 3
The current political context
in France
§  Presided by François Hollande since 2012
§  Left wing social democrat (Parti Socialiste)
§  Lowest satisfaction rate for a French President
§  Same sex marriage
§  Surrogacy laws (GPA)
§  Assisted Reproductive Technology laws (PMA)
§  Voting rights for immigrants
§  One radical left wing activist was killed during a fist fight1
§  Ordinary people and journalists often get sued for
§  You may lose your job for displaying you opinions
§  It can also get you harrased or physically attacked
§  Eric Zemmour is a right wing polemist
§  He said this in the context of racial profiling by police
§  He was sentenced to pay 2000 Euros for provoking
racial hatred
De-anonymisation of French
political forums’ members
§  Members of such forums mostly use pseudonyms
§  They have a high expectation of privacy
§  Some savy posters register with disposable addresses
§  The identity of many users can easily be discovered
§  The authorities can obtain the user‘s identity with a court
order to the email provider
§  A political adversary can spearfish the users
Practical example of
de-anonymisation
§  The main French political forum uses Gravatar
§  The identity of its administator is suspected but not proved
§  A custom crawler was written to acquire MD5 hashes
§  A beta version of Hashcat was used to crack the hashes
§  45% of the email addresses were recovered
§  Mask up to 9 characters for the left side
§  Various left side dictionaries
§  Right side dictionaries of popular email domains
§  A few other rules
gmail.com live.fr
aol.com yahoo.fr
gmx.fr yahoo.com
hotmail.com ymail.com
hotmail.fr outlook.com
laposte.net bluewin.ch
msn.com voila.fr
aliceadsl.fr cegetel.net
club-internet.fr infonie.fr
libertysurf.fr neuf.fr
noos.fr numericable.fr
orange.fr sfr.fr
laposte.net wanadoo.fr
get2mail.fr mailinator.com
yopmail.fr yopmail.com
ymail.com *
0
50
100
150
200
250
300
Addresses containing username: 13%
Addresses containing numbers: 34%
Addresses ending in numbers: 32%
Addresses containing punctuation: 13%
Addresses containing a dot: 8%
Addresses containing an underscore: 3%
Addresses containing a dash: 1.7%
Addresses with punctuation and numbers: 4%
§  ....
De-anonymizing Members of French Political Forums - Passwords13

More Related Content

Viewers also liked

Human Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеровHuman Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеровАлена Лысак
 
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014 Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014 Алена Лысак
 
610o la promoción internacional de las universidades actores e instrumentos
610o   la promoción internacional de las universidades actores e instrumentos610o   la promoción internacional de las universidades actores e instrumentos
610o la promoción internacional de las universidades actores e instrumentosUniversidad Internacional Menendez Pelayo
 
INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION Ninfi Moreno
 
CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014Ayuntamiento Benissa
 
- og vi gør tingene færdige
- og vi gør tingene færdige- og vi gør tingene færdige
- og vi gør tingene færdigeRobert Herbers
 
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]RootedCON
 
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTETALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTEMaribel Garcia
 
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...Soluciona Facil
 
Programa preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAPPrograma preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAP17CongresoSefap
 
Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010Federico Pensa
 
ADCI Report Q4 2015
ADCI Report Q4 2015ADCI Report Q4 2015
ADCI Report Q4 2015Sewells MSXI
 

Viewers also liked (20)

Human Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеровHuman Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеров
 
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014 Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
 
FOTO Produccion
FOTO ProduccionFOTO Produccion
FOTO Produccion
 
610o la promoción internacional de las universidades actores e instrumentos
610o   la promoción internacional de las universidades actores e instrumentos610o   la promoción internacional de las universidades actores e instrumentos
610o la promoción internacional de las universidades actores e instrumentos
 
INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION
 
Flyer interplay radar_0811
Flyer interplay radar_0811Flyer interplay radar_0811
Flyer interplay radar_0811
 
Santiago duran
Santiago duranSantiago duran
Santiago duran
 
CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014
 
Concierto por la Paz - Paco Padilla
Concierto por la Paz - Paco PadillaConcierto por la Paz - Paco Padilla
Concierto por la Paz - Paco Padilla
 
- og vi gør tingene færdige
- og vi gør tingene færdige- og vi gør tingene færdige
- og vi gør tingene færdige
 
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
 
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTETALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
 
PR und Social Media
PR und Social MediaPR und Social Media
PR und Social Media
 
Tdah y trastornos del sueño
Tdah y trastornos del sueñoTdah y trastornos del sueño
Tdah y trastornos del sueño
 
Aumentame2013
Aumentame2013Aumentame2013
Aumentame2013
 
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
 
Programa preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAPPrograma preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAP
 
Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010
 
ADCI Report Q4 2015
ADCI Report Q4 2015ADCI Report Q4 2015
ADCI Report Q4 2015
 
Pollay
PollayPollay
Pollay
 

Similar to De-anonymizing Members of French Political Forums - Passwords13

How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Naga Rohit
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a passwordRob Gillen
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonMateus BahiaRicardo
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 

Similar to De-anonymizing Members of French Political Forums - Passwords13 (20)

How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of non
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Security pre
Security preSecurity pre
Security pre
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

De-anonymizing Members of French Political Forums - Passwords13

  • 1. De-anonymizing Users of French Political Forums Dominique Bongard CEO and janitor, 0xcite LLC, Switzerland dominique.bongard@0xcite.ch | @reversity | www.0xcite.ch
  • 2. What is Gravatar and how does it work Privacy attacks on Gravatar A practical example with political forums
  • 3. A little something about me Part 0
  • 4. §  French speaking Swiss citizen §  Reverse Engineer §  Specialized in embedded devices security
  • 5. What is Gravatar and how does it work Part 1
  • 6. §  Service which allows members of forums and blogs to automatically have the same profile picture on all participating sites §  Uses the MD5 hash of a person‘s email address as identifier §  Gravatar is owned by Automattic §  It is used by several major sites
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. §  Used for users who haven‘t registered an avatar §  Site administrators can also set a custom image §  MD5 hashes are also displayed for users who didn‘t register with Gravatar!
  • 12.
  • 13.
  • 14.
  • 15. Privacy attacks on Gravatar Part 2
  • 16.
  • 18. §  Use a password cracking software like Hashcat §  In 2008 Abell of developer.it recovered 10% of the email addresses of 80’000 stackoverflow.com users1 §  The attack was played down with the following arguments §  Spam is not the main issue, privacy protection is 1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
  • 19. 1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea "MD5 is plenty good for obfuscating the email address of users across the wire. if you're thinking of rainbow tables, those are all geared at passwords (which are generally shorter, and less globally different from one another) and not email addresses, furthermore they are geared at generating anything that matches the hash, NOT the original data being hashed. If you are thinking about being able to reproduce a collision, you still don't necessarily get the actual email address being hashed from the data generated to create the collision. In either case the work required to both construct and operate such a monstrocity would be prohibitively costly. If we left your password laying around in the open as a plain md5 hash someone might be able to find some data (not necessarily your password) which they could use to log in as you... Leaving your email address out as an md5 hash, however, is not going to cause a violent upsurge in the number of fake rolex watch emails that you get. Lets face it there are far more lucrative, easier, ways of getting email address. I hope this helps ease your mind."
  • 20. §  Yes emails are longer than passwords but: §  Email addresses are highly predictable §  GPU password crackers can try billions MD5 per second
  • 21. A practical example with political forums Part 3
  • 22. The current political context in France
  • 23. §  Presided by François Hollande since 2012 §  Left wing social democrat (Parti Socialiste) §  Lowest satisfaction rate for a French President
  • 24. §  Same sex marriage
  • 25. §  Surrogacy laws (GPA) §  Assisted Reproductive Technology laws (PMA) §  Voting rights for immigrants
  • 26. §  One radical left wing activist was killed during a fist fight1
  • 27. §  Ordinary people and journalists often get sued for §  You may lose your job for displaying you opinions §  It can also get you harrased or physically attacked
  • 28. §  Eric Zemmour is a right wing polemist §  He said this in the context of racial profiling by police §  He was sentenced to pay 2000 Euros for provoking racial hatred
  • 30. §  Members of such forums mostly use pseudonyms §  They have a high expectation of privacy §  Some savy posters register with disposable addresses
  • 31. §  The identity of many users can easily be discovered §  The authorities can obtain the user‘s identity with a court order to the email provider §  A political adversary can spearfish the users
  • 33. §  The main French political forum uses Gravatar §  The identity of its administator is suspected but not proved
  • 34. §  A custom crawler was written to acquire MD5 hashes §  A beta version of Hashcat was used to crack the hashes §  45% of the email addresses were recovered
  • 35. §  Mask up to 9 characters for the left side §  Various left side dictionaries §  Right side dictionaries of popular email domains §  A few other rules
  • 36. gmail.com live.fr aol.com yahoo.fr gmx.fr yahoo.com hotmail.com ymail.com hotmail.fr outlook.com laposte.net bluewin.ch msn.com voila.fr
  • 37. aliceadsl.fr cegetel.net club-internet.fr infonie.fr libertysurf.fr neuf.fr noos.fr numericable.fr orange.fr sfr.fr laposte.net wanadoo.fr
  • 39.
  • 41. Addresses containing username: 13% Addresses containing numbers: 34% Addresses ending in numbers: 32% Addresses containing punctuation: 13% Addresses containing a dot: 8% Addresses containing an underscore: 3% Addresses containing a dash: 1.7% Addresses with punctuation and numbers: 4%