Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 2 of 2
Like Tree2Likes
  • 2 Post By PriceLess

Thread: FBI Continues to Accuse North Korea of Sony Hack

  1. #1
    Extreme User
    PriceLess's Avatar
    Reputation Points
    42493
    Reputation Power
    100
    Join Date
    May 2014
    Posts
    7,971
    Time Online
    87 d 5 h 16 m
    Avg. Time Online
    34 m
    Mentioned
    576 Post(s)
    Quoted
    180 Post(s)
    Liked
    4129 times
    Feedbacks
    173 (100%)

    FBI Continues to Accuse North Korea of Sony Hack

    The Federal Bureau of Investigation continues to believe that North Korea is responsible for the hacking of Sony Pictures, despite the criticism from the public, which doubts the FBI’s findings.

    The FBI director pre-empted concerns of researchers that the involvement of North Korea was a smokescreen, saying they had evidence of the attackers’ IP addresses – the 12-digit string that identifies the location of a remote computer. Despite the fact that the attackers used proxy servers for most of the attack, they seem to have neglected the precaution in some occasions, thus revealing their own IP address, linking them to North Korea. In addition, the FBI reminds of its conclusion that patterns in the attack, including the language encoding and writing style, were similar to previous attacks attributed to North Korea.

    Nevertheless, independent researchers remain very skeptical, because IP addresses are usually not hard to spoof, and even if they really point to North Korea, this evidence is not sufficient to blame the government of the attack. In addition, other assertions from the Federal Bureau of Investigation have also been criticized even before the agency made any claims. For example, the fact that the Korean language is used in some files connected with the attack cannot prove the involvement of North Korea, which uses a very different dialect of Korean from the South. Finally, the encoding language of a PC is easy to set manually with the purpose to confuse investigators.

    Many independent security researchers point out that although it’s possible to identify the origins of cyber attacks (like it was with many of the Chinese attacks against American networks), it requires months of detailed analysis and investigation. This time period is useless at the moment of attack, when the company has to decide very quickly how its network should react and how its country is going to react. Perhaps, this stance can explain the relative disarray within the Obama administration over what to do about the suspected attacker (North Korea). Indeed, one should admit that the officials in the American government and various international institutions just don’t have the legal or conceptual framework to tackle such types of scenarios.
    deepeeb and TheTrader like this.

  2. #2
    New user marcolisi's Avatar
    Reputation Points
    10
    Reputation Power
    0
    Join Date
    Aug 2012
    Posts
    1
    Time Online
    22 m
    Avg. Time Online
    N/A
    Mentioned
    0 Post(s)
    Quoted
    0 Post(s)
    Feedbacks
    0
    I was wondering if there is any private torrent site that shares the original files that leaked, the ones that staid online on direct downlod links before getting removed. I was able to find all that leaked sony links on torrents but I am wondering if the files that now are being seeded are the original files have been leaked originally or they are tempered files tempered by Sony seeding incomplete/altered rars ....
    Anyone knows?



Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •