Author Topic: Computermix, Ipquarx, and Cca - CBM being hacked into to steal keys [chat+pics]  (Read 51069 times)

-snip-
Thanks for the post, hopefully it'll make Ravencroft stop saying that the exploiter doesn't have the full keys.

Well, considering it's a no-benefit service, there are obviously parts of it you skim on and because of that, security holes that get over-looked. That and paid services are the things that last long enough to patch all of the security holes like this one.

This is a terrible mindset.

Thanks for the post, hopefully it'll make Ravencroft stop saying that the exploiter doesn't have the full keys.
The problem with that post is that he makes it seem like having none or all of the key are the only two options, but it isn't. If for example you only had part of one key, then you could only decode part of the other keys. As I've said, if they had the full keys they would have done something in the whole month+ they've had, not just let it sit around.

Thanks for the post, hopefully it'll make Ravencroft stop saying that the exploiter doesn't have the full keys.
No it won't. If these losers actually had the full keys they would have done something by now, not just sit around with a list of 40 blockland keys and do nothing with it for a month and a half.


No it won't. If these losers actually had the full keys they would have done something by now, not just sit around with a list of 40 blockland keys and do nothing with it for a month and a half.
why not?

The problem with that post is that he makes it seem like having none or all of the key are the only two options, but it isn't. If for example you only had part of one key, then you could only decode part of the other keys.

Conveniently, by owning a copy of Blockland, you know your full key, not only part of it.

As I've said, if they had the full keys they would have done something in the whole month+ they've had, not just let it sit around.
No it won't. If these losers actually had the full keys they would have done something by now, not just sit around with a list of 40 blockland keys and do nothing with it for a month and a half.

If you honestly believe that you have no experience with electronic security breaches.

as far as i'm concerened, such mass scale key decryption has never been so succsesful- they probably intended on getting more peoples keys from cbm. maybe to blackmail people, or far more likely just to prove they could.

Sorry but I believe they're bullstuffting until proven otherwise.

If these losers actually had the full keys they would have done something by now
Says who, you? You're valuing your own unfounded moronic gut feeling over facts???

Says who, you? You're valuing your own unfounded moronic gut feeling over facts???
im gonna go with my gut here and say i am vishnu

Sorry but I believe they're bullstuffting until proven otherwise.
bae if you get revoked i'll buy you a new key


I aint lettin my bae suffer~

<3

I never trusted this cbm host nonsense since it started and it turns out I was right. bitch

I never trusted this cbm host nonsense since it started and it turns out I was right. bitch
Hey, no need for name-calling.

It's incredibly unlikely that the attackers just so happened to have a cbmhost users key on them. There are 2 scenarios that are tens of times more likely:
1. They only had a part of a key, and were not able to recover the rest because they didn't have the rest of the key.
2. They used an alternative method of extracting characters from the keydat, which didn't succeed in extracting all the characters. Not wishing to show that there were characters mising, the attackers only took a picture of the characters they had at the very end.