this post was submitted on 31 Mar 2024
586 points (97.6% liked)

Open Source

30831 readers
239 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] underisk@lemmy.ml 8 points 6 months ago (1 children)

we know about the singapore VPN because they connected to IRC on libera chat with it. the only reason I can think people would believe they're from hong kong is because of the pseudonym they used, but it's not like that proves anything.

see link posted in another user's reply: https://boehs.org/node/everything-i-know-about-the-xz-backdoor#irc

[–] tal@lemmy.today 2 points 6 months ago* (last edited 6 months ago) (1 children)

we know about the singapore VPN because they connected to IRC on libera chat with it.

Hmm.

I don't know if the VPN provider is willing to provide any information, but I wonder if it's possible to pierce the veil of VPN in at least approximate terms?

If you have a tcpdump of packets coming out of a VPN -- probably not something that anyone has from the Jia Tan group -- you have timings on packets.

The most immediate thing you can do there -- with a nod to Cliff Stoll's own estimate to locate the other end of a connection -- is put at least an upper bound and likely a rough distance that the packets are traveling, by looking at the minimum latency.

But...I bet that you can do more. If you're logging congestion on major Internet arteries, I'd imagine that it shouldn't take too many instances of latency spikes before you have a signature giving the very rough location of someone.

Some other people pointed out that if they used a browser, it may have exposed some information that might have been logged, like encodings.

[–] underisk@lemmy.ml 4 points 6 months ago

I don't foresee anyone with the kind of data needed to do more investigation releasing it to the public, so I doubt we're going to be getting any satisfying answers to this. Microsoft may have an internal team combing through github logs, but if they find anything they're unlikely to be sharing it with anyone but law enforcement agencies.