LX Pontual
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
ray@lemmy.ml to Privacy@lemmy.mlEnglish · 1 year ago

Police shut more than 14,000 accounts on Mega, Tutanota and Protonmail

therecord.media

external-link
message-square
28
fedilink
  • cross-posted to:
  • [email protected]
164
external-link

Police shut more than 14,000 accounts on Mega, Tutanota and Protonmail

therecord.media

ray@lemmy.ml to Privacy@lemmy.mlEnglish · 1 year ago
message-square
28
fedilink
  • cross-posted to:
  • [email protected]
LockBit takedown: Police shut more than 14,000 accounts on Mega, Tutanota and Protonmail
therecord.media
external-link
Accounts with third-party service providers were used “for exfiltration or infrastructure,” according to a post by law enforcement on LockBit’s seized darkweb domain.
alert-triangle
You must log in or register to comment.
  • delirious_owl@discuss.online
    link
    fedilink
    arrow-up
    59
    ·
    1 year ago

    Ah shoot, it’ll take them a whole month to recreate replacement accounts

  • Political Custard@lemmygrad.ml
    link
    fedilink
    arrow-up
    43
    ·
    1 year ago

    Interesting piece. It’s a bit weirdly worded in that it suggests that the police shut the accounts when really it’s Mega, Proton, Tuta who are closing the accounts. Presumably the police tell those companies which accounts are being used for illegal purposes and then those companies then close the accounts. I was a bit alarmed at first because it sounded like the authorities were closing the accounts when that’s not really the case.

    • GravitySpoiled@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      51
      ·
      edit-2
      1 year ago

      Removed by mod

      • AItoothbrush@lemmy.zip
        link
        fedilink
        English
        arrow-up
        39
        arrow-down
        1
        ·
        1 year ago

        Me trying to comprehend what the actual fuck this man is talking about

        • catloaf@lemm.ee
          link
          fedilink
          English
          arrow-up
          8
          ·
          1 year ago

          It’s nothing at all relevant to the post or comment they’re replying to. I have no idea.

        • haui@lemmy.giftedmc.com
          link
          fedilink
          arrow-up
          4
          ·
          1 year ago

          No idea whatsoever.

      • Dessalines@lemmy.ml
        link
        fedilink
        arrow-up
        17
        ·
        1 year ago

        I think you responded to the wrong comment.

        • GravitySpoiled@lemmy.ml
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          1 year ago

          I collect downvotes 😂

      • TheAnonymouseJoker@lemmy.ml
        link
        fedilink
        arrow-up
        9
        ·
        1 year ago

        Hey uhh, please pass me some of that good stuff. You seem lost.

        • muhyb@programming.dev
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          @LostLemmings

      • 0x2d@lemmy.ml
        link
        fedilink
        arrow-up
        4
        ·
        1 year ago

        no one here brought up apple

  • LucidBoi@lemmy.world
    link
    fedilink
    arrow-up
    23
    ·
    edit-2
    1 year ago

    So the police provide the companies with addresses associated with illegal activities and the companies disable those accounts?

    EDIT: This was a genuine question :p

    • ResoluteCatnap@lemmy.ml
      link
      fedilink
      English
      arrow-up
      15
      ·
      1 year ago

      Essentially. Police or anyone could report an account for illegal activity which is against ToS for all three of the services. From there the service would need to be able to substantiate the claim and then shut down the account. I’ve seen a few cases of proton accounts getting shut down. Proton can’t read emails but they can read headers and if you’ve posted illegal activity in public using your proton email address or if law enforcement/ someone reports you for using proton for illegal activity then proton will be able to review headers to determine if you’re violating ToS. Like a few years ago i think someone was using proton for ransomware, and proton was able to match the headers with emails that had been posted in public, and acct got shut down.

      Unfortunately can’t find that specific case but that was one example I’ve seen

      • LucidBoi@lemmy.world
        link
        fedilink
        arrow-up
        7
        ·
        1 year ago

        That sounds reasonable. Thanks for the explanation.

  • ryannathans@aussie.zone
    link
    fedilink
    arrow-up
    12
    ·
    1 year ago

    Tldr you aren’t recovering your data

  • bartolomeo@suppo.fi
    link
    fedilink
    arrow-up
    7
    ·
    1 year ago

    states the LockBit .onion site, now controlled by British officials.

    How does one hijack a .onion site?

    • catalog3115@lemmy.world
      link
      fedilink
      arrow-up
      13
      ·
      1 year ago

      You don’t hijack a .onion site. You pwn the server which hosts .onion site. Give you full access to site. You hijack .onion because its very secure

      • bartolomeo@suppo.fi
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        I see. How do you trace a .onion site back to it’s server?

        • catnip@lemmy.zip
          link
          fedilink
          arrow-up
          7
          ·
          1 year ago

          By pwning it. You dont have to find it to pwn it. You just have to be able to send data to it, which everyone can do because whats the point of having a server if noone can interact with it. The attacker just interacts with it in a way that manipulates it to execution attacker controlled code. So for a .onion website for example you find a vulnerability in the websites code and exploit it to make the server the website is running on do what you want.

        • /home/pineapplelover@lemm.ee
          link
          fedilink
          arrow-up
          5
          ·
          1 year ago

          Bad osint practices?

          • bartolomeo@suppo.fi
            link
            fedilink
            arrow-up
            2
            ·
            1 year ago

            Can you elaborate? Is the server address stored in some open source?

            • /home/pineapplelover@lemm.ee
              link
              fedilink
              arrow-up
              4
              ·
              1 year ago

              Nah nothing like that. I mean that they’re sharing info to friends willy nilly and some cops got wind of it. That’s kinda what happens to some of the dark web guys who get caught. It’s very rarely something very technical it’s just their own idiocy for reusing emails, transferring funds incorrectly making it traceable, Delivering sus packages all at once to usps

              • bartolomeo@suppo.fi
                link
                fedilink
                arrow-up
                1
                ·
                1 year ago

                Oooh, right.

        • catalog3115@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          1 year ago

          In simple terms you can’t trace back the server useless the webadmin did some stupidity or vulnerability

    • BaumGeist@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      Outside of controlling and rewriting the protocol: steal the keys used to generate the route or take over control of the server that hosts it

  • Tangent5280@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Is threcord.media down? Showing host issues on cloud fare for me.

    • ray@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      Seems like it. You can try https://web.archive.org/web/20240222164851/https://therecord.media/lockbit-ransomware-takedown-mega-tutanota-protonmail

      or

      https://archive.ph/?run=1&url=https%3A%2F%2Ftherecord.media%2Flockbit-ransomware-takedown-mega-tutanota-protonmail

      • Tangent5280@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        Nice. Would this work for any website? Can I just archive any webpage I can’t see on my end?

        • ray@lemmy.mlOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          Pretty much :)

Privacy@lemmy.ml

privacy@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

  • Lemmy.ml libre_culture
  • Lemmy.ml privatelife
  • Lemmy.ml DeGoogle
  • Lemmy.ca privacy

much thanks to @gary_host_laptop for the logo design :)

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1.12K users / day
  • 3.77K users / week
  • 6.98K users / month
  • 15.9K users / 6 months
  • 1 local subscriber
  • 37.7K subscribers
  • 3.31K Posts
  • 81.9K Comments
  • Modlog
  • mods:
  • k_o_t@lemmy.ml
  • tmpod@lemmy.pt
  • Yayannick@lemmy.ml
  • ranok@sopuli.xyz
  • BE: 0.19.8
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org