Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

They do hash IPs before sending them.


sort by: page size:

Ip? Hashes?

Or emailing them before they hash them.

How exactly do you expect them to send an email to an address they only have a hash of?

Even better, it’s a partial hash that gets sent.

I would guess they encrypt whatever they send to DHS. Hashing would destroy all the information required to make a match.

They are hashing the data.

Yes. But it would more likely be the case where they are encrypting the data before hashing it to reduce the chance for a hash collision.

Seems like a good method and actually more accurate than they do... seems like they just do a hash of IP.

I'm pretty curious how this happens technically -- is there a hash collision? Do they hash email addresses as a key or something?

Highly hashed IPs. Highly. Hashed. That made my day.

They have the email (confirmed email) in their DB. they can easily calculate the hash on the fly.

Sure, but who tells the client what the correct hash is?

Who knows, may be they can start to send id too by a special request from the server or send those hashes by other channels in addition to this one, but much later. And server can make such request based on some heuristics or based on some 'black list' of hashes. How can you know for sure? We can only guess to the certain degree without looking into sources.

Right, but they have to look at that data to create those hashes, no?

They got access to the server through some other undisclosed means, the hash was there.

Can’t they just compare hashes and for those where they have to do a scan, serve as an anonymous intermediary/proxy?

Wouldn't they need to have the file already if they know its hash?

The hash isn't even necessarily transmitted, and it's often partial hashes at that.

There are different kinds of hashes. You can, for example, assign numbers to your incoming IPs. The first one to come in gets 1, the second gets 2, and so on. Numbers zero out at midnight, correlation between them and real IPs are at the load balancer. Good luck bruteforcing these.
next

Legal | privacy