Pages:
Author

Topic: Tom Williams ~ The Smoking Gun(s) or Phin's Pholly - page 4. (Read 16319 times)

member
Activity: 98
Merit: 10
Stupidest thing I've heard in my entire life. How crazy do you think I am?

At least as crazy as I am stupid.  Tongue

Regarding the salting: The salt adds an additional pseudorandom element into the password prior to hashing. Without it, two identical plaintext passwords would show up in the password file with identical hashes. Once you crack one of them, you've cracked both of them. With the salt, the two identical plaintext passwords are likely to produce different salted hashes in the password file. Even though they both have the same plaintext password, cracking one doesn't trivially tell you that you've also cracked the other one. So, you need to go to all of the same work to crack each instance of that same password. I think the salting also makes rainbow tables impractical, but I'm no expert on this stuff.
legendary
Activity: 1764
Merit: 1002
Explain the significance of a password starting with "$1$" or not.
Here's what the "$1$" prefix means. Don't read anything more than this into the "$1$" prefix.

Originally, MtGox stored hashed passwords in their database. A few years ago, this was considered reasonably secure, but the development and distribution of "rainbow tables" made hashed passwords insecure. (A "rainbow table" is essentially a reverse-lookup which takes you from a hashed password to a candidate unhashed password.)

In response to this, many websites (including MtGox) upgraded their systems to store salted hashed passwords instead of plain hashed passwords. This makes basic rainbow tables unusable for password cracking.

The problem is: how do you upgrade the existing passwords to use the new salting scheme? You don't know the existing passwords; you only know their hash. So you wait until the user logs on with a password that matches the hash. At that point, the user has just entered their actual password so you calculate the password's salted hash, and store that in the database in place of the unsalted hash.

A common technique (which was used at MtGox) represents the salted hashes with a prefix of "$1$", to distinguish it from unsalted hashes and to identify the salting/hashing scheme.

tl; dr:  From the presence of the "$1$" prefix we can deduce that the user logged in one or more times after MtGox changed to salted hashes. From the absence of the "$1$" prefix we can deduce that the user created their account before MtGox changed to salted hashes, and did not log in to that account between that time and when the password file was leaked.

can you explain exactly why salting is done?  i think i know after having perused the unhashed password list leaked from mtgox.  i was amazed at how many passwords were either identical or very close such as "qwerty" and "qwerty1".  does the random salt act like a nonce of random characters/digits that make the resulting hash much more complicated than it would be otherwise and thus more secure?  if so, when i type in a simple password how does my computer know the nonce so that the resulting hash matches the mtgox hash?  furthermore, it sounds like the hackers got into mtgox DB and got the hashed passwords directly.  would that be enough to access individual accts?  if so, why did they spend so much time brute forcing the hashes into the simple passwords?
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
Before I go any further with this, I want to state that I sent a PM to Stefan Thomas offering my deepest apology for getting weusecoins.com into this mix.

I'm about to reply to your PM as well, but just to make one thing very clear, I don't think you need to apologize here. If it was a mistake, I'm glad that you are helping to clear up my name, but in the big picture I'm grateful that you're putting in the time to do this research in the first place. The only thing that would tie this whole mess up properly is if somebody finds Tom Williams.

As I said, because of the fact that we used the same hosting, I can't fault people for seeing a connection.

So the apology is accepted and I very much respect how you handled the whole thing. Please don't let this incident discourage you from investigating me or anybody else.

WOW! Simply, WOW! Can you (readers) imagine if all company owners handle situations with such professionalism. This is a class act! Thank you so kindly, Stefan.

Quote
I don't think you need to apologize here.

I do feel that I have to apology here, otherwise the other members will continue to put stuff in my coffee when I'm away from my desk.
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
Phinnaeus:  do you still have the .csv list of all the hacked accts on mtgox?  every source i've googled today has been taken down.

I put the link is the first post of this thread and it's still working: http://dump.udderweb.com/Censorship/mtgox_leak.txt

there was a list with the unhashed passwords circulating.  do you have that?

No, I do not, cyperdoc. Don't you think that one list is more than enough for me to get into trouble with? Like I've stated, I knew this list existed but never took time to hunt it for I had no use for it. I found it by accident the other day which started me on free-stacking my marbles. This is the first I've heard about unhashed passwords, and believe you me, I'm not going to Google it.

PS: You can call be Bruno or Phin, and you have my permission to refer to my work here as Phin's Pholly.

I like it! Phin's Pholly should be in the thread title.  Cheesy

Stupidest thing I've heard in my entire life. How crazy do you think I am?

full member
Activity: 234
Merit: 100
AKA: Justmoon
Before I go any further with this, I want to state that I sent a PM to Stefan Thomas offering my deepest apology for getting weusecoins.com into this mix.

I'm about to reply to your PM as well, but just to make one thing very clear, I don't think you need to apologize here. If it was a mistake, I'm glad that you are helping to clear up my name, but in the big picture I'm grateful that you're putting in the time to do this research in the first place. The only thing that would tie this whole mess up properly is if somebody finds Tom Williams.

As I said, because of the fact that we used the same hosting, I can't fault people for seeing a connection.

So the apology is accepted and I very much respect how you handled the whole thing. Please don't let this incident discourage you from investigating me or anybody else.
legendary
Activity: 1764
Merit: 1002
Phinnaeus:  do you still have the .csv list of all the hacked accts on mtgox?  every source i've googled today has been taken down.

I put the link is the first post of this thread and it's still working: http://dump.udderweb.com/Censorship/mtgox_leak.txt

there was a list with the unhashed passwords circulating.  do you have that?
member
Activity: 98
Merit: 10
PS: You can call be Bruno or Phin, and you have my permission to refer to my work here as Phin's Pholly.

I like it! Phin's Pholly should be in the thread title.  Cheesy
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
Quote
I did not look at the pwd file to see if it is similiar past the a but I am confident that Bruno did not assume every friggin password with $1$ in front of it was the same.

That is correct, sadpandatech. There was only one instance where I showed that the passwords match.

Before I go any further with this, I want to state that I sent a PM to Stefan Thomas offering my deepest apology for getting weusecoins.com into this mix. As previous stated, I see where my error was and have posted how it occurred. I will continue to play armchair detective, but will be more careful with what I post. I promise that I will continue to make mistakes, but will try to keep them to the bare minimum. I have no agenda in regards to this Bitcoin issue with the exception of finding the truth, not as I see it, but as it is. I hope that my crazy research project here has in someway helped, not hurt, Bitcoin. I want to further state that I gave Stefan my personal phone number and he can do with it as he wishes. It's no secret that I live in Sandwich, Illinois and am easy to find.

Bruno

PS: You can call be Bruno or Phin, and you have my permission to refer to my work here as Phin's Pholly.
hero member
Activity: 504
Merit: 500
Explain the significance of a password starting with "$1$" or not.
Here's what the "$1$" prefix means. Don't read anything more than this into the "$1$" prefix.

Originally, MtGox stored hashed passwords in their database. A few years ago, this was considered reasonably secure, but the development and distribution of "rainbow tables" made hashed passwords insecure. (A "rainbow table" is essentially a reverse-lookup which takes you from a hashed password to a candidate unhashed password.)
A few years ago, as in like 15?

In response to this, many websites (including MtGox) upgraded their systems to store salted hashed passwords instead of plain hashed passwords. This makes basic rainbow tables unusable for password cracking.
Again, the response to this was well before Gox was in operation. More on this in a bit.


The problem is: how do you upgrade the existing passwords to use the new salting scheme? You don't know the existing passwords; you only know their hash. So you wait until the user logs on with a password that matches the hash. At that point, the user has just entered their actual password so you calculate the password's salted hash, and store that in the database in place of the unsalted hash.

A common technique (which was used at MtGox) represents the salted hashes with a prefix of "$1$", to distinguish it from unsalted hashes and to identify the salting/hashing scheme.

 The answer should have been; you don't, you friggin salt and shadow the passwords to begin with!  That prefix technique would be pretty nifty if it were in conjunction with taking some sort of furthner action on the unsalted ones.

 Case in point; About 14 years ago sadpanda owned a small hosting/dial-up firm. With roughly 2500~ dial ups, 500~ hosted sites and a partner who had the vision to monitize our userbase with our own "webmail". That was exciting, ad revenue and a new offering for our existing customers and potential new ones. There was one issue however and that was a big, fat unsalted password table.

 Not long after we set the customer base up on the new webmail servers did we start to notice 'breaches' in the form of mails in customer inboxes that did not orginate from our mail servers. A good majority of which were trojan laced. We spent many a night integrating virus scanning on the mail servers and manually forcing customers with weak passwords to update them. A daunting task which would have continued to become a growing burden until I called an associate who himself owned a sizable hosting firm.

 Skipping past the fee he wanted to come help my auditing efforts, he made short work of pointing out what I feel now should be obivous. It took him all of a few hours to exclaim, "Are these passwords unsalted and in their default locations?" Well, you by now know the answer to that. Just thinking about the implications of what that meant, not only in the immediate security issue but in what it would entail to get all those users to update their passwords, gave me quite the headache.

 After a few days of manually fixing things I realized the only way to 'fix' it quick was going to be to update all the passwords ourselves. At this point we had added salt into our pwds and moved the storage of them to a shadowed format. And thats where we decided that we had no choice but to 'crack'(L0pht before they went legit) all the passwords ourselves and then push them through the salt. This would not patch up any one who had already been comprimised but certainly did put us in a posistion where we could stop chasing new breaches and focus on securing existing ones. Amen! 

 As an aside, the perps quickly became very unhappy about their lost playground and attempted to Ddos the piss out of our upstream. Unfortunatly for them we owned the exit nodes at our upstream and managed all the filtering ourselves.. ;p

tl;dr  14 years ago we began to salt and shadow on a system not used for financials and I would have assumed anyone setting up a secure system would have done so since then. :/

tl; dr:  From the presence of the "$1$" prefix we can deduce that the user logged in one or more times after MtGox changed to salted hashes. From the absence of the "$1$" prefix we can deduce that the user created their account before MtGox changed to salted hashes, and did not log in to that account between that time and when the password file was leaked.

Sorry for all that off-topic wall of text. Those of us who reconize the salting realized what the $1$ was prefixed on the hashes.

 Not to verify or disprove any of the 'research' Bruno has done here but the $1$ prefix does not remove what he had pointed out. If you look back at the mathcing passwords he showed, one being unsalted and the other being $1$ but with $1$a , as what he was eluding to. I did not look at the pwd file to see if it is similiar past the a but I am confident that Bruno did not assume every friggin password with $1$ in front of it was the same.

  All that aside I personaly feel Tux has come a LONG way from where he started with this new venture and have not noticed anything as concering as the orginal issues. And, I definetly have to appluad his moxie in not giving in to the $7k extortion thing. That sounds like it could be quite stressing and possibly dangerous.

 Now with the mybitcoin thing I can't help but feel, after listening to Hero's input that it sounds almost like some breaches started to become noticed and got out of hand before the orginal devs could do much about it. It seems like they were scared off by something and pretty much abandoned ship, leaving someone to deal with it pretty much on their own. Just my take on it now.

cheers everyone.
donator
Activity: 826
Merit: 1060
Explain the significance of a password starting with "$1$" or not.
Here's what the "$1$" prefix means. Don't read anything more than this into the "$1$" prefix.

Originally, MtGox stored hashed passwords in their database. A few years ago, this was considered reasonably secure, but the development and distribution of "rainbow tables" made hashed passwords insecure. (A "rainbow table" is essentially a reverse-lookup which takes you from a hashed password to a candidate unhashed password.)

In response to this, many websites (including MtGox) upgraded their systems to store salted hashed passwords instead of plain hashed passwords. This makes basic rainbow tables unusable for password cracking.

The problem is: how do you upgrade the existing passwords to use the new salting scheme? You don't know the existing passwords; you only know their hash. So you wait until the user logs on with a password that matches the hash. At that point, the user has just entered their actual password so you calculate the password's salted hash, and store that in the database in place of the unsalted hash.

A common technique (which was used at MtGox) represents the salted hashes with a prefix of "$1$", to distinguish it from unsalted hashes and to identify the salting/hashing scheme.

tl; dr:  From the presence of the "$1$" prefix we can deduce that the user logged in one or more times after MtGox changed to salted hashes. From the absence of the "$1$" prefix we can deduce that the user created their account before MtGox changed to salted hashes, and did not log in to that account between that time and when the password file was leaked.
full member
Activity: 189
Merit: 101
I'm up to 1.23million VexCoins... is the ebook almost ready?

legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
50730,haakjes,frank@root66.org,$1$9...    (Is  weusecoins.com)

I don't understand the connection? I started WeUseCoins and I've never heard of [email protected].

21 tweets, with almost as many users, to date contain "weusecoins.com": http://twitter.com/#!/search/realtime/weusecoins.com

According to our AddThis share widget 5262 people tweeted about weusecoins.com. Twitter search shows you only the latest tweets (note they're all from last week). I tweeted about it here and here.


Not sure if this has been pointed out already, but WeUseCoins is hosted at Leaseweb, so yeah. Undecided It is one of the largest hosting providers in Europe, but still I can't really fault anybody for drawing a connection on that point.

My journey into Bitcoin is somewhat documented from IRC chats in December 2010 and early 2011. And also by the fact that at the first Swiss Bitcoin meetup in early February 2011 I didn't really know a lot about Bitcoin yet, which the other attendees Mike Hearn, cdecker and bitdragon can probably confirm. MyBitcoin has been around far longer than I've been into Bitcoin, but of course it's hard to prove a negative that I didn't know about Bitcoin longer.

I'm only following the forums occasionally, so if anybody has any questions, Phinnaeus was kind enough to post my email address already Tongue, but here it is again: [email protected]


Hello, Stefan Thomas. Bruno here. You're not going to believe this, but members of this forum have been putting something in my coffee when I'm not looking. That said, please accept my apology on this issue. The mistake I made is this: Registrant Email:[email protected] where Frank van Vliet is the owner.

I'm going to clean up some of what I've written so that your good name doesn't get smeared. Thank you kindly for the soft post to me, although this time a few curse words may have been in order.

Sincerely, Bruno
full member
Activity: 234
Merit: 100
AKA: Justmoon
50730,haakjes,frank@root66.org,$1$9...    (Is  weusecoins.com)

I don't understand the connection? I started WeUseCoins and I've never heard of [email protected].

21 tweets, with almost as many users, to date contain "weusecoins.com": http://twitter.com/#!/search/realtime/weusecoins.com

According to our AddThis share widget 5262 people tweeted about weusecoins.com. Twitter search shows you only the latest tweets (note they're all from last week). I tweeted about it here and here.


Not sure if this has been pointed out already, but WeUseCoins is hosted at Leaseweb, so yeah. Undecided It is one of the largest hosting providers in Europe, but still I can't really fault anybody for drawing a connection on that point.

My journey into Bitcoin is somewhat documented from IRC chats in December 2010 and early 2011. And also by the fact that at the first Swiss Bitcoin meetup in early February 2011 I didn't really know a lot about Bitcoin yet, which the other attendees Mike Hearn, cdecker and bitdragon can probably confirm. MyBitcoin has been around far longer than I've been into Bitcoin, but of course it's hard to prove a negative that I didn't know about Bitcoin longer.

I'm only following the forums occasionally, so if anybody has any questions, Phinnaeus was kind enough to post my email address already Tongue, but here it is again: [email protected]
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
Nah, I love hunting with dogs. They have great noses, and I have color vision and opposable thumbs. The rabbits don't stand a chance against us.

I should be sleeping, but I'm working on something.

member
Activity: 98
Merit: 10
Nah, I love hunting with dogs. They have great noses, and I have color vision and opposable thumbs. The rabbits don't stand a chance against us.
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
Maybe BW worked at BofA under the TW alias for fun and profit?

I know your type. You're just trying to throw me off the scent.



member
Activity: 98
Merit: 10
Maybe BW worked at BofA under the TW alias for fun and profit?
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
21 tweets, with almost as many users, to date contain "weusecoins.com": http://twitter.com/#!/search/realtime/weusecoins.com

Tomorrow, it will be the same users, in the same exact order, with the same exact tweets. Mark my word on this one. LOL!
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
Twitter         http://twitter.com/zium

Jan van Vliet   (related?)
BitCoin: The decentralized, digital alternative to government fiat money! weusecoins.com
14 Jun via Tweet Button

Are you suggesting that Jan van Vliet is/was directly involved with the weusecoins.com folks? Barring some other link that I haven't perceived yet, I could easily see him as being just another Bitcoin enthusiast who stuck the weusecoins.com reference in his signature to promote his area of interest, just as I have been known to link to things which interest me but which I have had no direct involvement in creating. Like the Apple sticker that I stuck on my work-issued Lenovo laptop; I have no relationship with Apple other than repeatedly giving them lots of money for another hit of their sweet shinies. If I recall correctly, and my brain is not too fogged by the cheap store-brand vodka (don't worry, I'm not Russian), van Vliet appears to be involved with web/network service provision. His apparent connection to other People Of Interest may be due to nothing more than having provided them with services, thus learning about Bitcoins in the process, and then subsequently signing up for some of the same popular, well-publicized services as them. Maybe it's no coincidence that his name shows up in multiple particular places, yet there's another quite plausible explanation for that other than direct involvement with any of our favorite scams. Remember: Correlation does not always imply causation.



I believe this part:

Quote
His apparent connection to other People Of Interest may be due to nothing more than having provided them with services, thus learning about Bitcoins in the process, and then subsequently signing up for some of the same popular, well-publicized services as them. Maybe it's no coincidence that his name shows up in multiple particular places, yet there's another quite plausible explanation for that other than direct involvement with any of our favorite scams.

But, as you may have well read, FVV is a known hacker. Jan could be a close relative. And look at who Jan follows: http://twitter.com/#!/zium/following  and who FVV follows: http://twitter.com/#!/jhfssrjmouyihgg/following




Take a walk with me on this one, for it's only an eight block stretch: (Google it!)

50731,hammerfortyfour,[email protected]    115 West 42nd Street, New York, NY 10036
667,brucewagner,[email protected]                   290 5th Ave, New York, NY 10001

sr. member
Activity: 490
Merit: 250
21 tweets, with almost as many users, to date contain "weusecoins.com": http://twitter.com/#!/search/realtime/weusecoins.com
Pages:
Jump to: