![]() He ordered pasta Bolognese and chewed with his mouth wide open. It was a tense meeting, not unlike a bizarre job interview: "Have you ever done this before? Why are you doing this? What's your favorite position? Favorite dessert?"ĭespite a serious lack of chemistry, we trudged on to dinner-partly because I'm an optimist, but mostly because I was broke. His ill-fitting shirt and khakis had bits of lunch stained into them. Meeting face-to-face, however, was a different story. In his pictures, he looked the part of a healthy and normal middle-aged father- striped polo shirts, running shoes, and the like. Later, as our "date" was winding down, he swiftly and firmly held my jaw in place and proceeded to kiss me. I accepted and met him at a tacky little bar in Midtown East. After exchanging a few messages, he finally mustered up enough courage to ask me to dinner. He was looking for that "special someone" with whom he could "gaze at the stars with." John was your typical Ashley Madison customer: He was married, white, well-off, and a commuter-which is a bonus, because it allows them to keep their affairs separate from everything else. He was one of the first men to message me on the site. How any of them ever managed to land themselves wives is beyond me. None of them are all that charming, and they don't know how to talk to women (saying "LOL" out loud does not count as youthful wit). To them, if they order the right drink (an old fashioned) and say the right things ("I work in advertising/tech/fashion/finance"), women will give 'em their panties and bend over. Most of the men I've met on Ashley Madison seem to think they're Don Draper. You may remember, that’s one of the same ways the FBI concluded that North Korea was behind the Sony hack.The Men Think They're More Charming Than They Are If the hackers didn’t use Tor or a similar anonymity service, the investigators may be able to collect clues from the IP address used to log in to the box. They undoubtedly will want to know how the server was accessed. ![]() Police and private investigators working feverishly to identify the people who hacked Ashley Madison and published user profiles, transactions, credit-card data, and a wide range of other sensitive data will almost certainly try to perform a forensic analysis of the physical server. The box seeding the torrent was located at 94.102.63.121. As Goodin explains, for those with a technical bent: It’s operated by a Dutch Internet service provider called Ecatel Ltd. Basically, we know a few details about the server that was used to host the leaked file containing the emails of Biderman, the company’s CEO. Dan Goodin over at Ars Technica has a good rundown. There’s another lead I haven’t mentioned. So t hat’s really all we have to go off of? It was definitely a person here that was not an employee but certainly had touched our technical services.”īut Biderman seems to have dropped that narrative - we haven’t heard much in the way of that assertion since. “I’ve got their profile right in front of me, all their work credentials. “We’re on the doorstep of who we believe is the culprit, and unfortunately that may have triggered this mass publication,” Biderman had told investigative cybersecurity reporter Brian Krebs. ![]() If anyone involved in the investigation has any clue about Impact Team’s true identity, then that information has yet to be publicly disclosed.īack in July when the company received its first threats, Avid Life Media CEO Noel Biderman said his team was closing in on the culprit, who he said he believed to be somebody who did contract work with the company. We know the person or group calls itself “Impact Team,” which is new to the cybercriminal scene as far as anyone can tell, at least under that monicker. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |