SlideShare una empresa de Scribd logo
1 de 43
Descargar para leer sin conexión
De-anonymizing Users of
French Political Forums
Dominique Bongard
CEO and janitor,
0xcite LLC, Switzerland
dominique.bongard@0xcite.ch | @reversity | www.0xcite.ch
What is Gravatar and how does it work
Privacy attacks on Gravatar
A practical example with political forums
A little something about me
Part 0
§  French speaking Swiss citizen
§  Reverse Engineer
§  Specialized in embedded devices security
What is Gravatar and how
does it work
Part 1
§  Service which allows members of forums and blogs to automatically
have the same profile picture on all participating sites
§  Uses the MD5 hash of a person‘s email address as identifier
§  Gravatar is owned by Automattic
§  It is used by several major sites
§  Used for users who haven‘t registered an avatar
§  Site administrators can also set a custom image
§  MD5 hashes are also displayed for users who didn‘t
register with Gravatar!
Privacy attacks on Gravatar
Part 2
matt.mullenweg@automattic.com 58f266c26cd28643c9f3ae42c858dfe5!
mullenweg@automattic.com 9a68676b220b1357308951c3ce0b3911!
matt@automattic.com c0ccdd53794779bcc07fcae7b79c4d80!
§  Use a password cracking software like Hashcat
§  In 2008 Abell of developer.it recovered 10% of the email
addresses of 80’000 stackoverflow.com users1
§  The attack was played down with the following arguments
§  Spam is not the main issue, privacy protection is
1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
"MD5 is plenty good for obfuscating the email address of users
across the wire. if you're thinking of rainbow tables, those are all
geared at passwords (which are generally shorter, and less globally
different from one another) and not email addresses, furthermore
they are geared at generating anything that matches the hash, NOT
the original data being hashed. If you are thinking about being able to
reproduce a collision, you still don't necessarily get the actual email
address being hashed from the data generated to create the collision.
In either case the work required to both construct and operate such a
monstrocity would be prohibitively costly. If we left your password
laying around in the open as a plain md5 hash someone might be
able to find some data (not necessarily your password) which they
could use to log in as you... Leaving your email address out as an
md5 hash, however, is not going to cause a violent upsurge in the
number of fake rolex watch emails that you get. Lets face it there are
far more lucrative, easier, ways of getting email address. I hope this
helps ease your mind."
§  Yes emails are longer than passwords but:
§  Email addresses are highly predictable
§  GPU password crackers can try billions MD5 per second
A practical example with
political forums
Part 3
The current political context
in France
§  Presided by François Hollande since 2012
§  Left wing social democrat (Parti Socialiste)
§  Lowest satisfaction rate for a French President
§  Same sex marriage
§  Surrogacy laws (GPA)
§  Assisted Reproductive Technology laws (PMA)
§  Voting rights for immigrants
§  One radical left wing activist was killed during a fist fight1
§  Ordinary people and journalists often get sued for
§  You may lose your job for displaying you opinions
§  It can also get you harrased or physically attacked
§  Eric Zemmour is a right wing polemist
§  He said this in the context of racial profiling by police
§  He was sentenced to pay 2000 Euros for provoking
racial hatred
De-anonymisation of French
political forums’ members
§  Members of such forums mostly use pseudonyms
§  They have a high expectation of privacy
§  Some savy posters register with disposable addresses
§  The identity of many users can easily be discovered
§  The authorities can obtain the user‘s identity with a court
order to the email provider
§  A political adversary can spearfish the users
Practical example of
de-anonymisation
§  The main French political forum uses Gravatar
§  The identity of its administator is suspected but not proved
§  A custom crawler was written to acquire MD5 hashes
§  A beta version of Hashcat was used to crack the hashes
§  45% of the email addresses were recovered
§  Mask up to 9 characters for the left side
§  Various left side dictionaries
§  Right side dictionaries of popular email domains
§  A few other rules
gmail.com live.fr
aol.com yahoo.fr
gmx.fr yahoo.com
hotmail.com ymail.com
hotmail.fr outlook.com
laposte.net bluewin.ch
msn.com voila.fr
aliceadsl.fr cegetel.net
club-internet.fr infonie.fr
libertysurf.fr neuf.fr
noos.fr numericable.fr
orange.fr sfr.fr
laposte.net wanadoo.fr
get2mail.fr mailinator.com
yopmail.fr yopmail.com
ymail.com *
0
50
100
150
200
250
300
Addresses containing username: 13%
Addresses containing numbers: 34%
Addresses ending in numbers: 32%
Addresses containing punctuation: 13%
Addresses containing a dot: 8%
Addresses containing an underscore: 3%
Addresses containing a dash: 1.7%
Addresses with punctuation and numbers: 4%
§  ....
De-anonymizing Members of French Political Forums - Passwords13

Más contenido relacionado

Destacado

Human Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеровHuman Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеров
Алена Лысак
 
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014 Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Алена Лысак
 
610o la promoción internacional de las universidades actores e instrumentos
610o   la promoción internacional de las universidades actores e instrumentos610o   la promoción internacional de las universidades actores e instrumentos
610o la promoción internacional de las universidades actores e instrumentos
Universidad Internacional Menendez Pelayo
 
INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION
Ninfi Moreno
 
CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014
Ayuntamiento Benissa
 
- og vi gør tingene færdige
- og vi gør tingene færdige- og vi gør tingene færdige
- og vi gør tingene færdige
Robert Herbers
 
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
RootedCON
 
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTETALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
Maribel Garcia
 
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Soluciona Facil
 
Programa preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAPPrograma preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAP
17CongresoSefap
 
Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010
Federico Pensa
 

Destacado (20)

Human Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеровHuman Capital Forum 2013: Мир внутренних тренеров
Human Capital Forum 2013: Мир внутренних тренеров
 
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014 Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
Присоединяйтесь к формированию контента HUMAN CAPITAL FORUM 2014
 
FOTO Produccion
FOTO ProduccionFOTO Produccion
FOTO Produccion
 
610o la promoción internacional de las universidades actores e instrumentos
610o   la promoción internacional de las universidades actores e instrumentos610o   la promoción internacional de las universidades actores e instrumentos
610o la promoción internacional de las universidades actores e instrumentos
 
INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION INSTRUMENTO DE EVALUACION
INSTRUMENTO DE EVALUACION
 
Flyer interplay radar_0811
Flyer interplay radar_0811Flyer interplay radar_0811
Flyer interplay radar_0811
 
Santiago duran
Santiago duranSantiago duran
Santiago duran
 
CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014CLUB CICLISTA BENISSA - RUTES 2014
CLUB CICLISTA BENISSA - RUTES 2014
 
Concierto por la Paz - Paco Padilla
Concierto por la Paz - Paco PadillaConcierto por la Paz - Paco Padilla
Concierto por la Paz - Paco Padilla
 
- og vi gør tingene færdige
- og vi gør tingene færdige- og vi gør tingene færdige
- og vi gør tingene færdige
 
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
CCN-CERT - Servicio De Respuesta A Incidentes [RootedCON 2010]
 
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTETALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
TALLER FIGURACIÓN Y ABSTRACCIÓN CIUDAD Y ARTE
 
PR und Social Media
PR und Social MediaPR und Social Media
PR und Social Media
 
Tdah y trastornos del sueño
Tdah y trastornos del sueñoTdah y trastornos del sueño
Tdah y trastornos del sueño
 
Aumentame2013
Aumentame2013Aumentame2013
Aumentame2013
 
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...Programa día de internet  #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
Programa día de internet #HootUpGandia - 2013-05-17 Urbalab Gandia - davidm...
 
Programa preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAPPrograma preliminar 17 Congreso SEFAP
Programa preliminar 17 Congreso SEFAP
 
Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010Agrifoglio_Dicembre_2010
Agrifoglio_Dicembre_2010
 
ADCI Report Q4 2015
ADCI Report Q4 2015ADCI Report Q4 2015
ADCI Report Q4 2015
 
Pollay
PollayPollay
Pollay
 

Similar a De-anonymizing Members of French Political Forums - Passwords13

USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
BilmyRikas
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
sumita02
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
STO STRATEGY
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of non
Mateus BahiaRicardo
 
Password hacking
Password hackingPassword hacking
Password hacking
Abhay pal
 

Similar a De-anonymizing Members of French Political Forums - Passwords13 (20)

How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of non
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Security pre
Security preSecurity pre
Security pre
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

De-anonymizing Members of French Political Forums - Passwords13

  • 1. De-anonymizing Users of French Political Forums Dominique Bongard CEO and janitor, 0xcite LLC, Switzerland dominique.bongard@0xcite.ch | @reversity | www.0xcite.ch
  • 2. What is Gravatar and how does it work Privacy attacks on Gravatar A practical example with political forums
  • 3. A little something about me Part 0
  • 4. §  French speaking Swiss citizen §  Reverse Engineer §  Specialized in embedded devices security
  • 5. What is Gravatar and how does it work Part 1
  • 6. §  Service which allows members of forums and blogs to automatically have the same profile picture on all participating sites §  Uses the MD5 hash of a person‘s email address as identifier §  Gravatar is owned by Automattic §  It is used by several major sites
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. §  Used for users who haven‘t registered an avatar §  Site administrators can also set a custom image §  MD5 hashes are also displayed for users who didn‘t register with Gravatar!
  • 12.
  • 13.
  • 14.
  • 15. Privacy attacks on Gravatar Part 2
  • 16.
  • 18. §  Use a password cracking software like Hashcat §  In 2008 Abell of developer.it recovered 10% of the email addresses of 80’000 stackoverflow.com users1 §  The attack was played down with the following arguments §  Spam is not the main issue, privacy protection is 1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea
  • 19. 1 http://www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea "MD5 is plenty good for obfuscating the email address of users across the wire. if you're thinking of rainbow tables, those are all geared at passwords (which are generally shorter, and less globally different from one another) and not email addresses, furthermore they are geared at generating anything that matches the hash, NOT the original data being hashed. If you are thinking about being able to reproduce a collision, you still don't necessarily get the actual email address being hashed from the data generated to create the collision. In either case the work required to both construct and operate such a monstrocity would be prohibitively costly. If we left your password laying around in the open as a plain md5 hash someone might be able to find some data (not necessarily your password) which they could use to log in as you... Leaving your email address out as an md5 hash, however, is not going to cause a violent upsurge in the number of fake rolex watch emails that you get. Lets face it there are far more lucrative, easier, ways of getting email address. I hope this helps ease your mind."
  • 20. §  Yes emails are longer than passwords but: §  Email addresses are highly predictable §  GPU password crackers can try billions MD5 per second
  • 21. A practical example with political forums Part 3
  • 22. The current political context in France
  • 23. §  Presided by François Hollande since 2012 §  Left wing social democrat (Parti Socialiste) §  Lowest satisfaction rate for a French President
  • 24. §  Same sex marriage
  • 25. §  Surrogacy laws (GPA) §  Assisted Reproductive Technology laws (PMA) §  Voting rights for immigrants
  • 26. §  One radical left wing activist was killed during a fist fight1
  • 27. §  Ordinary people and journalists often get sued for §  You may lose your job for displaying you opinions §  It can also get you harrased or physically attacked
  • 28. §  Eric Zemmour is a right wing polemist §  He said this in the context of racial profiling by police §  He was sentenced to pay 2000 Euros for provoking racial hatred
  • 30. §  Members of such forums mostly use pseudonyms §  They have a high expectation of privacy §  Some savy posters register with disposable addresses
  • 31. §  The identity of many users can easily be discovered §  The authorities can obtain the user‘s identity with a court order to the email provider §  A political adversary can spearfish the users
  • 33. §  The main French political forum uses Gravatar §  The identity of its administator is suspected but not proved
  • 34. §  A custom crawler was written to acquire MD5 hashes §  A beta version of Hashcat was used to crack the hashes §  45% of the email addresses were recovered
  • 35. §  Mask up to 9 characters for the left side §  Various left side dictionaries §  Right side dictionaries of popular email domains §  A few other rules
  • 36. gmail.com live.fr aol.com yahoo.fr gmx.fr yahoo.com hotmail.com ymail.com hotmail.fr outlook.com laposte.net bluewin.ch msn.com voila.fr
  • 37. aliceadsl.fr cegetel.net club-internet.fr infonie.fr libertysurf.fr neuf.fr noos.fr numericable.fr orange.fr sfr.fr laposte.net wanadoo.fr
  • 39.
  • 41. Addresses containing username: 13% Addresses containing numbers: 34% Addresses ending in numbers: 32% Addresses containing punctuation: 13% Addresses containing a dot: 8% Addresses containing an underscore: 3% Addresses containing a dash: 1.7% Addresses with punctuation and numbers: 4%