Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Games

Hacker Releases 1.7TB Treasure Trove of Gaming Info 293

mvar writes "According to Kotaku, a hacker named SuperDaeE who breached multiple gaming companies (Valve, Sony, MS to name a few) has released a 1.7TB treasure trove file for download. The file which contains source code for older titles plus development kits for the PS4 and Xbox One consoles, is encrypted and SuperDaeE claims that it is his insurance in case he gets arrested."
This discussion has been archived. No new comments can be posted.

Hacker Releases 1.7TB Treasure Trove of Gaming Info

Comments Filter:
  • Insurance Policy? (Score:5, Insightful)

    by Orestesx ( 629343 ) on Monday June 10, 2013 @01:02PM (#43963531)
    Right...cause if he gets in trouble, blackmail will surely get him out of it.
  • by Anonymous Coward on Monday June 10, 2013 @01:03PM (#43963545)

    Now hackers everywhere have a reason to get SuperDaeE arrested.

  • FTP? (Score:5, Insightful)

    by Anonymous Coward on Monday June 10, 2013 @01:04PM (#43963557)

    > using centralized resource to distribute "insurance"
    >> 2013

  • by Darkness404 ( 1287218 ) on Monday June 10, 2013 @01:07PM (#43963609)
    This sounds like too large of an "insurance" to be useful. Most people don't have the bandwidth or the space to hold 1.7 TB of encrypted info. Smaller files might make sense but not huge ones like this.
  • Encrypted blob (Score:5, Insightful)

    by SirGarlon ( 845873 ) on Monday June 10, 2013 @01:11PM (#43963663)
    I totally believe it's possible to exfiltrate data from multiple game companies (or indeed any companies). But how do we know he didn't just upload a 1.7 TB encrypted blob of random garbage? The word of a 17-year-old script kiddie is not exactly a lot to go on.
  • by VorpalRodent ( 964940 ) on Monday June 10, 2013 @01:13PM (#43963703)
    And even if they did...what's the value? Please explain to me if I'm missing something, but if I can't decrypt it, then my having a copy is just to protect his "insurance policy", in which case I'm aiding and abetting. I assume additional risk with zero potential benefit, except perhaps helping "stick it to the corporate blah blah blah"?
  • Re:Encrypted blob (Score:4, Insightful)

    by CastrTroy ( 595695 ) on Monday June 10, 2013 @01:19PM (#43963759)
    And it seems odd that there would be so much data. Source code doesn't take that much space, and neither do development kits. Perhaps he's including game assets like textures and cut scenes from the games, but I don't really see much point in including that, since it would mostly be easy to extract from the actual game files themselves.
  • lol wat (Score:2, Insightful)

    by Anonymous Coward on Monday June 10, 2013 @01:24PM (#43963851)

    Insurance in what sense?

    1. Get arrested;
    2. Release password to unencrypt source code for old software;
    3. Get charged with yet another crime;
    4. ???

  • by Anonymous Coward on Monday June 10, 2013 @01:32PM (#43963939)

    Just for reference, if you look at the summary you'll see that what he's released is that trove... encrypted. The idea is that if he gets arrested, he yells out the passphrase, but until then this might as well be 1.7TiB of /dev/random

  • by PRMan ( 959735 ) on Monday June 10, 2013 @01:36PM (#43963991)
    "China: Bastion of civil rights." Has kind of a funny ring to it...
  • by spiffmastercow ( 1001386 ) on Monday June 10, 2013 @01:44PM (#43964091)

    Just for reference, if you look at the summary you'll see that what he's released is that trove... encrypted. The idea is that if he gets arrested, he yells out the passphrase, but until then this might as well be 1.7TiB of /dev/random

    My guess is it's 1.7GB of /dev/random anyway.

  • by nedlohs ( 1335013 ) on Monday June 10, 2013 @02:16PM (#43964465)

    Because yelling a passphrase is easier than yelling out 1.7TB of data on the spot?

  • by Anonymous Coward on Monday June 10, 2013 @02:19PM (#43964509)

    He's a minor himself. The "child pornography" could be pictures of his own dick for all we know, or a 17 year old girlfriend. The "drug" charges are "posession of cannabis and cannabis paraphernalia" so who gives a shit and the "weapons" charge was supposedly a stun gun. Not a taser, just one of those sparky things.

  • by DrXym ( 126579 ) on Monday June 10, 2013 @02:57PM (#43964867)
    Safe how? It sounds like he is being charged for possession of kiddy porn among other things. He'll be tried and convicted regardless of his "threat" (which in itself is a offence) and if he's fucking stupid enough to release the key he can expect to receive fresh charges on top since he has just incriminated himself. So he'll probably go from 3-5 years up to 10+ years. Doubtless all sentencing to be served consecutively. Great plan that.
  • by TiggertheMad ( 556308 ) on Monday June 10, 2013 @05:50PM (#43966849) Journal
    More to the point, unless the 1.7TB contains something of interest in the first place (ex: stolen source code that isn't encrypted), who is going to bother to download it? See, you have to give people an incentive to download that much shit before they are going to act as your own personal distributed storage service.

    Bet when he gets arrested (not if), that there aren't any copies of his 'get out of jail card' in the wild.

    Also, just for the record, have there ever been instances of anyone successfully blackmailing the cops into letting them go? Ever?

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...