Lulzsec fiasco

1:45:00 PM
Lulzsec fiasco -
We received concerns by users that our VPN service was used by one or more members of the hacktivist group 'of lulzsec'. Lulzsec were ALLEGEDLY been responsible for a number of high profile cases such as

  • Sony Playstation Network Piracy which compromised the names, words password, e-mail addresses, addresses and dates of birth of thousands of people.
  • The DDOS attack that hit the British governments SOCA (Serious Organised Crime Agency) and other government websites offline.
  • The release of a variety of sensitive and confidential information from companies such as AT & T, Viacom, Disney, EMI, NBC Universal and AOL.
  • access to NATO's servers and to release documents related to communication and information system (CIS) in Kosovo.
  • The defacing websites of British newspapers The Sun and The Times.
  • The hacking of 77 lawyers sights execution sheriff.

He first came to our attention when leaked IRC chat were released in newspapers these participants discussed the various VPN services they use and it became clear that some members were using our service. No action was taken after all there was no evidence to suggest wrongdoing and nothing to identify accounts with us they used. At a later date, it is no surprise to have received a court order to request information relating to an account associated with some or all of the above cases. As stated in our terms of use and privacy policy of our service should not be used for illegal activities, and as a legitimate company we will cooperate with law enforcement if we receive a court order (the equivalent of a subpoena in the US).

Our VPN services and VPN services in general are not designed to be used to commit illegal activity. It is very naive to think that by paying a subscription to a VPN service, you are free to break the law without any consequences. This includes certain hardcore privacy services that claim you'll never identified, these types of services that do not cooperate are more likely to have their entire VPN network controlled and operated by law enforcement, thus affecting all legitimate customers.

We also wish to clarify some misconceptions about what we do and what we represent. In 05, we set HMA primarily as a means of circumventing censorship of world-wide-web be it a government or a corporate ladder / located. We really believe the world-wide-web should be uncensored anyway worldwide. An excellent example of this would be the Egyptian revolution for which our service has been key to the protestors have access to sites such as Twitter have been blocked by the government, we experienced record traffic during this period. Although our web proxy represents a high percentage of our traffic, our VPN service represents substantially all of our revenues. Our main customer base use our VPN service to ensure their sensitive web traffic can not be intercepted on insecure networks, but there are many other legitimate uses such as the ability to unlock GEO-restricted websites. Explore our Hide My Ass! notice and you will be able to gain a decent understanding of who uses our service and why

16:32 edit :. We had some requests that our forestry policy. We only record the time to connect and disconnect from our service, we do not log any form of your actual internet traffic

9:05 p.m. edit :. Why do we record ^ above information? Being able to locate abusive users is imperative for the survival of operating a VPN service, if you can not take measures to prevent abuse you risk losing server contracts with upstream suppliers in -jacents that allow your network. Common abuse can be anything from spam to fraud, and the most serious cases involve terrorism and child porn. The main type of logging is the recording of the session - this is simply logging when a client connects and disconnects from the server, this identifies which was connected to the IP address X X times, what we do and everything we do. Some providers choose not to session recording and instead try to locate the abusive client using the intelligence of the complaint, for example if someone hacks XYZ.com they can monitor traffic to and connect XYZ.com you know that customers have a connection to that site. Ask yourself this: If a vendor claims not to do any form of logging, but is able to locate abusive customers, how are they able to do this without any form of logging

[[1945009?] 10:01 p.m. edit: we are a company based in the UK LTD and only comply with the law of the United Kingdom, if a request for information is sent to us of abroad, we will not accept the request unless it is sent through the appropriate UK channels and a judge from the United Kingdom justifies a court order or a subpoena that requires us to provide these information. We are not intimidated by the US government as some claim, we simply respect our country's legal system to avoid potentially stop and we continued.

10:05 p.m. edit: regarding censorship circumvention, some said it is hypocritical for us claim we do not allow activities illegal, and claim our service is used in some countries to avoid illegal censorship. Again, we follow British law, there is not a law that prohibits the use of the Egyptians to access blocked sites such as Twitter, even if one in Egypt but ... are certainly laws regarding piracy of government systems and businesses.
Previous
Next Post »
0 Komentar