Posted: 2/20/2006 9:18:08 AM EDT
http://fishbowl.pastiche.org/2006/02/19/the_perils_of_metadata February 19, 2006 The Perils of Metadata
The Washington Post publishes an extended interview with a botnet-running hacker, known only as 0×80:
The young hacker… has agreed to be interviewed only if he isn’t identified by name or home town…
The article still has a lot of magazine-style colour:
Tall and lanky, with hair that falls down to his eyebrows, 0×80 almost never looks you in the eye when he talks, his accent a slurry of heavy Southern drawl and Midwestern nasality. He lives with his folks in a small town in Middle America. The nearest businesses are a used-car lot, a gas station / convenience store and a strip club, where 0×80 says he recently dropped $800 for an hour alone in a VIP room with several dancers.
There’s also an artfully disguised photo, presumably of 0×80:
With all this detail (and more) about 0×80’s circumstances and history, it’s a good thing the Post is keeping his identity secret. In a small town of a few thousand people, it would otherwise be pretty easy to track the hacker down from his description.
The article is then linked from Slashdot, where an astute commenter downloads the image and checks out the EXIF IPTC data:
Location: Roland OK
Roland OK is indeed a piece of small-town Middle America, population 3,000. Another commenter quickly finds the most likely used car lot, gas station and strip club.
I think there’s a lesson in there somewhere. Posted to nerd at February 19, 2006 10:06 PM
|
here's the post article: http://www.washingtonpost.com/wp-dyn/content/article/2006/02/14/AR2006021401342.html
.... In the six hours between crashing into bed and rolling out of it, the 21-year-old hacker has broken into nearly 2,000 personal computers around the globe. He slept while software he wrote scoured the Internet for vulnerable computers and infected them with viruses that turned them into slaves.
Now, with the smoke of his day's first Marlboro curling across the living room of his parents' brick rambler, the hacker known online as "0x80" (pronounced X-eighty) plops his wiry frame into a tan, weathered couch, sets his new laptop on the coffee table and punches in a series of commands. At his behest, the commandeered PCs will begin downloading and installing software that will bombard their users with advertisements for pornographic Web sites. After the installation, 0x80 orders the machines to search the Internet for other potential victims.
....
|
|
|