So The FBI Can Just Take A Copy Of All Instapaper User Data With No Recourse?

from the that-doesn't-seem-right dept

We recently wrote about the FBI’s server seizures in the hunt for LulzSec, noting the collateral damage that took down servers of a few different popular websites. One of the seized servers was a backup server for the very popular service Instapaper, which many people use to save web pages and other info. While Instapaper’s Marco Arment notes that the FBI did return the server relatively quickly, it’s possible that the FBI now has a copy of pretty much everyone’s Instapaper data, which could reveal a lot about some people.

Possibly most importantly, though, the FBI is now presumably in possession of a complete copy of the Instapaper database as it stood on Tuesday morning, including the complete list of users and any non-deleted bookmarks. (?Archived? bookmarks are not deleted. ?Deleted? bookmarks are hard-deleted out of the database immediately.)

Instapaper stores only salted SHA-1 hashes of passwords, so those are relatively safe. But email addresses are stored in the clear, as is the saved content of each bookmark saved by the bookmarklet.

The server also contained a complete copy of the Instapaper website codebase, but not the codebase of the iOS app.

Linked Facebook, Twitter, or Tumblr accounts only store their respective OAuth keys. Linked Evernote accounts only store the Evernote email-in address. Linked Pinboard accounts, however, store plaintext usernames and encrypted passwords, and the encryption keys are present in the website source code on the server.

So the FBI now has illegal possession of nearly all of Instapaper?s data and a moderate portion of its codebase, and as far as I know, this is completely out of my control.

Marco is quite reasonably pissed off at the hosting company, DigitalOne, who never contacted him about this (before or after the raid, including up until the blog post, days later). Frankly, that’s unconscionable. For an ISP to simply not tell their customer that a server has been seized? Marco is also upset that DigitalOne didn’t do anything to stop the seizure. Now, on both of those accounts, it’s possible that DigitalOne’s hands were tied. There’s not much they can realistically do if the FBI shows up with a seizure warrant, even if it’s super broad. And we have seen the FBI use gag orders barring ISPs from talking about what was seized.

But, really, that just goes to show, yet again, the problems of such government seizures with no prior adversarial hearings. I recognize that they’re looking for evidence that might disappear, but the chance for serious collateral damage, including potentially serious privacy violations, seems pretty high. I’m not sure there’s anything he could do, but it certainly would make for an interesting lawsuit if either Marco or an Instapaper customer decided to sue the federal government over these seizures.

Filed Under: , , ,
Companies: instapaper

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “So The FBI Can Just Take A Copy Of All Instapaper User Data With No Recourse?”

Subscribe: RSS Leave a comment
96 Comments
out_of_the_blue says:

So don't use online storage!

Would never occur to me, as I came out of the dark days when the Personal Computer freed us from time-sharing on a centralized computer. Now everyone is hot to let a central system (euphemized as “the cloud”) store all their vital and personal data — FREE for the plucking by anyone, too. Drawbacks are obvious and particular gotchas seem to be discovered almost daily; I see no /point/ let alone advantages to it.

Anonymous Coward says:

Encrypt Your Data People

It’s kinda sad about the fourth amendment. You have to assume that any data of yours, stored at any place not under your direct control, could fall into the hands of any security service, any law enforcement organization or any criminal, at any time. Your only defense is to use strong encryption at all times. Do not purchase any service which does not give you strong encryption as standard, with the key under your control.

Key security and management is your problem, which you need to solve locally. If you use the world’s least secure operating system, namely Windows, on any server or your management console, it is game over, you lose. Be careful. The only person looking after your interests is you. Never forget that.

freak (profile) says:

Re: Re:

HAHAHAHA.

haha.

ha.

Current encryption technology would require the entire universe acting as a computer with each atom as a transistor, for the entirety of time so far to crack only (on average) 10,000 256-bit encryptions.
I haven’t done that calc in a while, (it’s somewhere in the comments on a past story here), but I believe that calc also assumed the universe was solidly packed instead of mostly ’empty’. If that’s the case, then the real calc would be somewhere closer to 10^-18 256-bit encryptions could’ve been broken.

Anyways, I don’t think you mean ‘brute-force’, but I will allow the possibility that current algorithms might possibly be cracked in twenty years. I doubt it, but I won’t deny the possibility.

leichter (profile) says:

Re: Re: Re: Re:

A meaningless comparison. Key length is one of those obvious things – after all, it’s just a number and bigger is clearly better, right? – that leads people astray all the time. The thing to keep in mind is that what matters is not the *number of bits in the key*, it’s the number of possible distinct keys. If I told you “I use AES-256 for absolute security, but it’s easy for me to remember the key: I only choose keys between 1 and 1000” – well, that’s obviously not very secure: You can guess my key in at most 1000 tries!

For a system like AES, every possible 128 (or 192 or 256) bit combination is a valid key. The strength of the system (against a brute force attack!) can be read directly off the number of bits. No conceivable computer will ever be able to attack a 256-bit key, and personally I cannot imagine a situation where a 128-bit key could be brute-forced.

For a system like RSA, only very special combinations of bits correspond to valid keys. An AES key is just a bunch of bits, while an RSA key, as a number, has to be product of exactly two prime numbers in a particular range, with special properties to boot. Even then, there would be too many values to try in a pure brute force fashion- but because of the necessary mathematical properties of an RSA key, no one does that. Instead, they use more efficient techniques that rely on those mathematical properties. A 1024 bit RSA key requires about as much computational effort as an 80-bit AES-like key. That’s why the current recommendation is for at least 2048 bits (roughly the equivalent of 112 AES-like bits), though that’s considered pushing it a bit. To get to the equivalent of a 128-bit AES key, you need a 3072-bit RSA key; to match AES-256, you need a 15360-bit RSA key! Such keys actually get used today. In 2005, if you combine published estimates, experts were predicting that 1024-bit RSA should be phased out by 2010 (though high-value uses should move faster). OK, so half way through that period, *one* 1024-bit RSA key was broken … though in fact even that isn’t true. (Breaking an RSA key amounts to factoring a large number into its two constituent primes. What the link points to was a successful factorization of a very specially chosen number – 2^1039-1 – for which even better mathematical techniques are known. Even so, it took the equivalent of 100 years of computer time. An indication that it was time to move on from 1024-bit keys? Absolutely. A practical “break” for massive numbers of RSA keys? Not quite.

An alternative to RSA is elliptic curve crypto (ECC), which has the same public-key properties but can use many more possible combinations of bits in a key, so can get by with dramatically shorter keys. In fact, to get the ECC equivalent of n-bit AES, you need 2n-bit ECC.

????????????????????????????????????????????????????????– Jerry

Nicedoggy says:

Re: Re: Re:2 Re:

There is another post that didn’t made it through the filter were I apologized for the use of “brute-force” to describe how people could undo the encryption.

Still in the 90’s I believe the most used encryption was still DES not AES.

If you get something with a DES or RSA one probably can decode it.
http://www.sciengines.com/copacobana/

Also even AES have some shortcomings like if people use passwords that are less than 32 characters in length rainbow tables could make it easy to find the correct one, in that case you are attacking the encryption by its sides and who knows how it was implemented there could be problems in the implementation even if the theory is flawless like the Debian/Ubuntu OpenSSL Random Number Generator Vulnerability

Now I read somewhere that even the government is considering use of ECC because they don’t see AES being secure for long, but that is from memory and I could be wrong.

Anonymous Coward says:

Re: Re: Re:

It’s possible. It’s also possible that monkeys will fly out of your butt. But since it isn’t likely, you don’t worry about it much. It is equally unlikely that the FBI copied content from servers that they don’t have a warrant for, once they have determined what the server is and what it is used for.

That of course would also depend if instapaper was used for less than honest purposes. At that point, yes, the FBI might have a copy of it all pending investigation by their experts.

Nicedoggy says:

Re: Re: Re: Re:

When did you see law enforcement passing on the opportunity to snoop on others?

When?

Is not only likely, but most certainly the agents copied everything before giving it back, even if it was to take a look at the contents later to find something they could use as leverage if those people sue.

What is unlikely is that they didn’t copy it.

Now I ask you again, what part of “It’s possible” you don’t understand?

The post didn’t accused the FBI of anything, but it was concerned about those possible and most probable scenarios and why there is no means to address those issues.

Anonymous Coward (user link) says:

Re: Re: Re: Re:

No, that’s not possible (nor probable). At most you will only get one monkey out of my butt. My abdomen and intestinal track are only so big, I’ll allow that a single monkey “might” be squeezed in there, but not multiple. Unless of course, you’re positing that an heretofore unknown species of pygmy monkeys is living up there. However,I believe(and I could be wrong) that you’re stretching the definition of the word possible at this point.

But thanks for playing…

Anonymous Coward says:

Re: Re:

“There is an incredibly lack of information here for anyone to be making claims against the FBI.”

That doesnt matter to the “followers of Mike”. You are supposed to just say Moo and follow the herd.

Like this: My rights are at stake here. The government is trying to do away with the constitution. We need more transparancy. The law enforcers shouldnt be allowed to do anything without getting permission from the supreme court first.

velox says:

Re: Re: Re:

‘…”followers of Mike”. You are supposed to just say Moo and follow the herd. ‘

You apparently, and quite foolishly, appear to believe that Mike simply tells his readers what to think.
—>You don’t happen to work in the old-media Broadcast business do you?

There are many people who have opinions similar to Mike, and they choose to express themselves in the comment sections here. In case you haven’t noticed, they also express themselves in the comment sections of many major newspapers around the country. Mike’s ideas are not rare or unusual. Unfortunately editors around the country don’t seem to be paying much attention.
Everywhere I go, I hear people of all economic positions are talking about the government’s assault on civil liberties. The political parties had better watch out because this isn’t a liberal thing, and it’s not a conservative thing, it’s a fed-up American thing. It’s high time that both Repubs. and Dems. stopped telling us that meekly surrendering our liberty is the Patriotic thing to do.

Anonymous Coward says:

Re: Re: Re: Re:

You said: “You apparently, and quite foolishly, appear to believe that Mike simply tells his readers what to think”

Me: You don’t think so? Re-read the site with an unbiased eye, and you will see plenty of attemptd to tell people what to think. Many of the posts in the last couple of weeks have involved trying to re-frame discussions, but trying to significantly expand defintions, to ignore basic court rulings, and generally to try to paint a picture that isn’t entirely realistic.

Much of it is done by parroting anti-copyright sites like Torrent Freak, which has some truly biased “reporting” on their site.

The rest is typically done by mocking reports that he doesn’t agree with, or carefully playing with quotes and reports to draw conclusions that are just not clearly supported by the data, or that have other way more plausible answers.

There are many people with a similar opinion as Mike. They ignore the laws unless they favour their cause, they always say “the judge got it right” when they block some action, and “the *AA’s paid off another judge” when the results aren’t in their favor.

It’s fun to watch them go, fun to watch them post comments here. It’s even funnier when you find one or two of them actually working in the mass media, and making their living from companies that use and apply copyright to their work.

JMT says:

Re: Re: Re:2 Re:

Of course if you were a blogger instead of an anonymous coward, your blog would be completely unbiased, state only facts but no opinions, never use any other websites for source info, not allow any dissenting comments, and not make any speculations based on previous experience. And it would be such a thrilling read…

velox says:

Re: Re: Re:2 Re:

… parroting anti-copyright sites like Torrent Freak…

I wouldn’t know if you are correct about this or not. I’ve never read Torrent Freak in my life.

I happen to think it more interesting (and alarming) to watch the media apologists here blithely promote any new proposal which makes copyright more onerous and rigid regardless of what the consequences are for civil liberties in this country.

Constitution…schmonstitution seems to be the attitude.
The perfect case in point is Mr. Dark Gray Snowflake above in this thread.

If you happen to know anything about the circumstances which brought our country into existence, and if you know anything about the circumstances through which other countries who have had freedom lost theirs, you just can’t help but be concerned by the ‘damn the consequences’ attitudes displayed by media company defenders here. The restrictions of freedom that are being proposed may have consequences that could extend far beyond the sphere of the media in years to come. Remember the proposals being made aren’t just theoretical. They involve laws and establish precedents that would give government the legal right to do things which it has never had either the right nor the technical capability to do in the past.

darryl says:

Re: Re: Re:2 Re:

we’ll said sir, but it wont change a thing for Mike, he is quiet happy stuck in his own little rut, with his merry band of die hard followers/worshipers.

Typical is their TAM comments “The Anti-Mike” which has to mean they to consider Mike to be some form of God or dieaty for there to be possible an “anti-Mike”.

Sure if Mike is your Christ, and you feel that people who do not follow the church of Mike would be considered TAM (THE ANTI-MIKE) or the Anti-Christ.

I am glad all your Mike followers have such faith in this surmons, and preaching at you.

Niall (profile) says:

Re: Re: Re:3 Re:

Ok, daft darryl logic #235358979.

‘Anti’ simply means ‘against’. Yes there is a construction “anti-Christ” meaning “opposed to Christ”. However, using “Anti-Mike” to mean “against Mike” (on everything and everything, without logic) does not somehow mean we are expanding Mike to god-like proportions. No-one here feels any need to deify Mike – if anything, it’s the trolls who seem to feel the need to turn him into a baddie of Satanic proportions!

Honestly darryl, try and stay in the shade more 😉

Nicedoggy says:

About encryption, I want to note that current encryption algorithms probably will last 10 to 20 years before they can be easily brute forced, so encryption only buys time in the case of static storage, so please don’t store criminal activity in files that could be open 20 years later and have no statute of limitations 🙂

Anonymous Coward says:

Re: Encryption

Encryption actually does not have to be very good and it defeats the security services. Get yourself an encryption key which is several thousand bits long and truly random, then the dear old XOR the plaintext with the key, over and over, will work just fine. Back that up with prior data compression and a spot of running it through AES and the codebreakers are SOL. They could be up for $trillions to have any hope of brute forcing it. Not going to happen.

Remember how hissy various pollies got about not being able to read Blackberry messages? Have you noticed the slow progress on cleaning up botnets? The botmasters are protecting themselves with encryption. It’s working just fine for those guys, and they have plenty of very determined opposition.

Nicedoggy says:

Re: Re: Encryption

Have you a text encrypted in 1990?
I bet any computer today can brute force that baby in seconds.

Since computers double processing power every year or so, even those thousand bit long encryption keys will not be that secure in 20 years.

Not to mention unknown vulnerabilities that could be uncovered in the future.

So unless you have encrypted content that can re-encrypt itself every year with the latest encryption and patch itself against vulnerabilities or use some type of death algorithim that depends on pieces from others places that go away with time rendering completely useless sooner or later people will be able to open that file.

I like to think of static encrypted files as time-capsules.

Nicedoggy says:

Re: Re: Re:2 Encryption

As freak on, Jun 25th, 2011 @ 5:12am, brute-force in the traditional sense will be impossible, but that encryption can be broken today by other means as pointed out in this article from 2007:
http://arstechnica.com/old/content/2007/05/researchers-307-digit-key-crack-endangers-1024-bit-rsa.ar s

As to the changes in how they were cryptographed you are correct it didn’t change that much, some bugs were found that I read about it and people started using longer keys, in the 90 the best people were commonly using I believe was 124 bit encryption, today we can have supercomputers in our homes that can achieve the necessary raw power to factor those numbers so I don’t believe they are secure anymore, if people are really interested they would be able to open the file, also most people don’t use really secure passwords so rainbow tables are an option that can open a file in minutes given a large enough table.

Viln (profile) says:

I'm with Marco...

I’m rather shocked that the on-site technicians at this data-center allowed the FBI to take a dozen boxes when the warrant clearly stated (presumably) one or two. I don’t mean attempting to physically prevent them or civil disobedience… it’s unthinkable that the FBI would send a team of officers to seize servers and not include at least one technician with the ability to determine which ones were which, so when a company very strongly protests you touching things not mentioned in your warrant and offers every means of assistance in locating and extracting the correct items and you ignore it and take the rack anyway… you create wiggle room for a lawsuit where otherwise no judge in today’s Patriot Opera world would bother to squeeze. The companies involved in hosting and storing these servers were put in a tough situation and I sympathize, but it smells like somebody rolled way too easily and these companies deserve an exodus of subscribers. If enough of a stink is made now, the next time you can be sure someone along the chain of command will say “be precise, don’t make me deal with another two weeks of internet and press frenzy”.

A Guy says:

I would hope that the FBI did not copy a server they have no warrant for. On the other hand, the company shouldn’t be in a position that they have to take the FBI’s word for it. Take them to court. Make them swear under oath that no copy of the server was made. It may take time, but it shouldn’t be too hard to find the truth out in a relatively cheap way if the company is concerned. If they want to get it out of the way quickly and cheaply, your data is probably safe. If they cite “ongoing investigations” or “national security” in court filings, your data is now in the possession of the FBI and they are probably already analyzing it.

darryl says:

Re: But mike says you cannot 'steal' data, and that copying it is ok, because you dont take away from the original.

I would hope that the FBI did not copy a server they have no warrant for.

NO they would not have done that (copy a server) they would have simply taken a complete image of the entire contents of the hard drives. No biggie, they get their server back.

and according to Mike, you cannot ‘steal’ data, therefore FBI did NOTHING that Mike should be able to disagree with,,,, Right Mike ???

Niall (profile) says:

Re: Re: But mike says you cannot 'steal' data, and that copying it is ok, because you dont take away from the original.

Well, technically it wasn’t ‘stolent’ – but it was quit possibly illegally accessed – i.e. ‘hacked’ 😉 Not to mention the copyright issues…

… shouldn’t ICE be taking down the FBI website in 3…2…1…? 😉

darryl says:

Answer to your question --- easy...

So The FBI Can Just Take A Copy Of All Instapaper User Data With No Recourse?

Judging by the rest of the comments you made after that question, and by you posing that question in the first place.

I feel you are seeking an answer for something you lack understanding in, so for you I will make it simple.

apparently

capable of being easily perceived or understood; plain or clear; obvious:

darryl says:

Re: Re: its as simple as "good" and "evil" !!!! LOL

I will try to make it clearer for you 🙂

say a “good man” is walking on the street, and he sees a crime being committed against someone.

if that good man “does nothing” he is allowing evil to trimph.

A good man doing nothing in the face of evil is therefore not a good man, but is in fact evil.

So then a “good man” would NEVER DO NOTHING in the face of evil!

So to say ‘for evil to prevail good men do nothing’ is incorrect. because the act of ‘doing nothing’ means in this situation they are in fact NOT ‘good men’ and if the choice is either Good or evil. and they are no ‘good’ therefore they must be evil.

once again, that is fine, but please if it does not make sense to you, state it does not make sense to you.

But it certainly does make sense to at least some people.

Jeni (profile) says:

Re: Re: Re: its as simple as "good" and "evil" !!!! LOL

But darryl, the inherent nature of a good person means they could not stand by and allow someone to be harmed, or not help someone they see in need, etc. if there was anything within their power they could do to help. Their conscious would not allow them to simple “do nothing”.

I guess true goodness is even more rare than I thought, if that’s too much for people to grasp.

The Devil's Coachman (profile) says:

I guarantee the FBI copied every last bit on everything.

Not only that, but they will undoubtedly use the copied data to expand their scope of investigation far beyond what the original warrant permitted (if there actually was a valid warrant at all). This is the type of “collateral damage” that we can expect from their nefarious activities, and what’s more, they probably won’t find anything about their purported perp – Lulzsec.

This is what they do, and with impunity. The ISP is at fault for failure to notify its clients, and the use of “gag orders” and other such nonsense is something one would expect in a fascist, totalitarian state. Sorry folks, but the US populace is screwed, totally, and forever. Your government thanks you, and expects your continued “cooperation”. Now bend over, and “cooperate”!

Gene Cavanaugh (profile) says:

FBI seizures

I am a veteran, and I was quite willing to give my life for my country, which I admired deeply.
However, this sounds more like the gestapo under Hitler than American. I am not sure I would be willing to serve, and certainly not willing to “give up my life”, for a country that allows such things.
I can only hope the American people (with the help of the blogs – certainly no help from the news media!) will someday come to their senses, and take steps to stop this sort of thing.

Thomas (profile) says:

The FBI will..

definitely look at their copy of the database to search for “terrorists”, but will probably just go ahead and see what they can find. I’m sure they won’t have a problem breaking the encryption. The spooks don’t really pay attention to constitutional protection any more; they now feel that “hunting for terrorists” justifies anything they want to do. Maybe we should just refer to all the federal spooks as the American Gestapo.

Nicedoggy says:

Re: They have your hashes, they have your password and all your data.

Quote:

Is an IT manager really going to manage to get the CFO to log in using ?fR4; $sYu 29 @QwmQz? without the combination ending up on a Post-it note in his wallet?

I have been thinking about that for a while and the best way to keep it secure and non-static that I could think of was Paper Keys.

One could get new encryption keys to everyone just by printing them and distributing those or uploading to their trusted cellphones(not recommended though) or a dedicated device that is designed to hold the keys.

One can print those in stickers that can be put on keychain, the thing is that it requires the machine to have a camera.

RFID could be used for the same purpose but they leak through the walls and can be grabbed on the streets.

Now using paper-keys along with a password that would be a 2 layer protection instead of the one we have today, any attacker would have to have the password and the digital key that can be updated several times per week or day, and if people get really paranoid they could use another layer maybe biometrics, but for casual users you could create really big passwords and store them in 2D barcodes like QR-Code and use those to sign in to services, the advantage is that the size of the password and its composition will no longer mater, the bad is that if you loose that piece of paper you are screwed.

Password change can be automated and probably would reduce the number of weak passwords on a real environment.

Maybe people should start making e-ink keychains like USB thumbdrives on one end you have your USB connection that goes on the computer and gets uploaded with the keys and in the other end when you push the button it pops out a little e-ink tongue that displays the key with the name of the key so people can use another bottom to cycle through 10 or more keys.

It would even work with third party websites for those who already use a e-wallet that stores their passwords it could authenticate against the password from the paperkey and every time you login to a service it changes the password automatically.

And of course passwords could be generated to be 256 characters long using symbols, now that would take a long time to brute force.

darryl says:

FBI does not need the passwords anyway !

It’s all a pointless argument anyway about password security, that security is only to stop any other user of the service from accessing someone elses data.

It does not stop someone with system admin rights to view all the data files that are on the server in PLAIN TEXT !.

So they dont even have to crack the passwords to access the information that people are storing on their servers.

Leave a Reply to Niall Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...