Garjon said:Thanks for the confirmation, though a bit of common sense was all we really needed for to debunk it. I do appreciate your work though and it's nice that we can finally put that matter to bed.
In your opinion, would you say the recent, numerous leaks of data and the current situation may be connected? Or would you say they are isolated incidents? Is it common for several companies to use the exact same encryption on all files?
I'm not up to date on what was leaked exactly, has it been determined precisely what was stolen, and if it was encrypted? From Sony's press release, they took the cautious side and implied that passwords might be out there, but didn't confirm it.
I'd say yes, it's common for several companies to use the same TYPE of encryption, and to use that same TYPE of encryption in multiple places. If that encryption type is flawed or compromised, it can cause serious issues. I don't think there's been any indication that some sort of encryption has been broken in this situation though. If the passwords and other sensitive information was decently encrypted, it's likely still secure, at least until enough resources are thrown at cracking it.
Regarding numerous leaks happening... what leaks are you talking about? Has Sorny had other leaks recently that I'm not aware of? This GracenoteDB thing is pretty unrelated to everything else. It's a poorly configured server, and likely wouldn't leak any confidential information.
Please stop talking about the DoD IP like it's related to the PSN hacking. It almost certainly isn't. The DoD IP did some vulnerability scanning (starting on the ... 7th of march? 3rd? I forget), which isn't wholely unusual.user_nat said:If you're smart enough to hack PSN, you probably know how to spoof an IP. Or atleast not dumb enough to do the hacking from work.