

Jason, who writes the blog Securityphile and doesn't publish his last name, tweeted, "hide my ass privacy service just became sell my ass to the feds." In the comments on the Privacy International blog post, PI technology adviser Eric King wrote: "There are many services who make far less grandiose claims about 'complete privacy' whose architecture inherently prevents them from being able to track or log users' activity. I know I would have put a number VPN and anonymizers out there hoping they would use them," wrote one (hopefully tongue-in-cheek) commenter on Ars Technica. The notion that a proxy server could or would identify its users to investigators has privacy advocates crying foul. Sony and the federal government see LulzSec hackers as criminal miscreants, but LulzSec sees itself as a revolutionary group. As the group Privacy International noted on its blog, that sets them up as "supra-legal arbiters of morality" who can choose to cooperate with some government requests and not others. The service claims that "the world-wide-web should be world-wide and not censored in anyway," after which it goes on to highlight its popularity among protesters in Egypt when the government blocked access to Twitter. But something doing business as might not be thought to be a normal business. Normal businesses do indeed regularly obey court orders. As stated in our terms of service and privacy policy our service is not to be used for illegal activity, and as a legitimate company we will cooperate with law enforcement if we receive a court order (equivalent of a subpoena in the US). At a later date it came as no surprise to have received a court order asking for information relating to an account associated with some or all of the above cases. No action was taken, after all there was no evidence to suggest wrongdoing and nothing to identify which accounts with us they were using. It first came to our attention when leaked IRC chat logs were released, in these logs participants discussed about various VPN services they use, and it became apparent that some members were using our service. The details of that search haven't been made public yet, but a post on Hidemyass's blog says the company cooperated with police investigating the LulzSec actions. And if somebody investigating a hacking job gets access to that server, it can reveal their identity. That's apparently what happened in the investigation into Kretsinger. But since the proxy server gets between the machines on either end of that exchange, it is in a position to know details about the hacker. By transmitting data through the proxy, a hacker can hide his or her ISP from the target. Very basically, a proxy server works as an intermediary stop for a signal between one computer and another. The federal indictment against Kretsinger charges that he used a proxy server site called to disguise his Internet protocol address.

That's got some in the online privacy community very nervous. But on Friday it emerged that the site he allegedly used to disguise his identity cooperated with police working to track him down. As we described on Thursday, the indictment against Kretsinger says he used what's called a proxy server to hide his identity while carrying out the attack. One of them, Cody Kretsinger, faces 15 years in prison for allegedly helping break into the Sony Pictures website with an SQL injection and publishing user data.

On Thursday, the FBI arrested two suspected hackers who allegedly participated in Anonymous and LulzSec attacks.
HIDEMYASS VPN LULZSEC ARCHIVE
This article is from the archive of our partner.
