- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
CMTiger101
| Favorite team: | |
| Location: | |
| Biography: | |
| Interests: | |
| Occupation: | |
| Number of Posts: | 2 |
| Registered on: | 8/19/2015 |
| Online Status: | Not Online |
Recent Posts
Message
re: ATTN OT Divorce Lawyers: Ashley Madison Info Dump Has Happened
Posted by CMTiger101 on 8/20/15 at 11:05 pm to ChunkyLover54
The "Louisiana" list(s) are just queries against the database dumps where "LA" appears as the state.
It should be pointed out that these are all PAYING customers. This isn't anywhere near the full number of people who ever created an account on AM.
The only place you put your full name is when you authorize a credit card payment. The name as it appears on the card has to jive with the CC authorization. Same generally with zip, security code, etc. That's why you're seeing real names and addresses. People who never paid for anything (the ability to message female/male members) likely only have their burner name, email, and screen name in the system. Unless they used their real email and someone searches for it, they'll never be outed. To top that off, there was no email verification required, so you could sign up with any email you felt like putting in the system.
Most of the women will also never show up, because women could communicate for free with men. Their subscriptions would likely have been for extra services (the ability to blast email a specific zip code if they were travelling there on business) or to contact FEMALE members...
However, what would be interesting would be to identify the email addresses and associated home zip codes of known female members.
All of it would require cobbling together the various tables that have been dumped. The "good stuff" which lists (presumably) the real names is an assortment of 2,600+ tables that list credit card transactions by day.
The only "lookup" site I saw where you could search by first/last name has been taken down via takedown notice. All of the "lookup" sites are sketch to begin with because they're bound to be logging the information. Spouses are putting each other at risk by entering each other's (or other people's) email addresses. Nobody is going to lookup a known fake address. That means they're just sitting back and collecting email addresses that they'll later know are legit addresses to hit with spam.
It should be pointed out that these are all PAYING customers. This isn't anywhere near the full number of people who ever created an account on AM.
The only place you put your full name is when you authorize a credit card payment. The name as it appears on the card has to jive with the CC authorization. Same generally with zip, security code, etc. That's why you're seeing real names and addresses. People who never paid for anything (the ability to message female/male members) likely only have their burner name, email, and screen name in the system. Unless they used their real email and someone searches for it, they'll never be outed. To top that off, there was no email verification required, so you could sign up with any email you felt like putting in the system.
Most of the women will also never show up, because women could communicate for free with men. Their subscriptions would likely have been for extra services (the ability to blast email a specific zip code if they were travelling there on business) or to contact FEMALE members...
However, what would be interesting would be to identify the email addresses and associated home zip codes of known female members.
All of it would require cobbling together the various tables that have been dumped. The "good stuff" which lists (presumably) the real names is an assortment of 2,600+ tables that list credit card transactions by day.
The only "lookup" site I saw where you could search by first/last name has been taken down via takedown notice. All of the "lookup" sites are sketch to begin with because they're bound to be logging the information. Spouses are putting each other at risk by entering each other's (or other people's) email addresses. Nobody is going to lookup a known fake address. That means they're just sitting back and collecting email addresses that they'll later know are legit addresses to hit with spam.
re: ATTN OT Divorce Lawyers: Ashley Madison Info Dump Has Happened
Posted by CMTiger101 on 8/19/15 at 9:13 pm to Bestbank Tiger
The data contains all of the usernames for the entire site since 2008. It also contains the corresponding credit card payments for members who paid for the service. It's like any other dating service, signing up is free, but to do anything you have to pay.
The username/membership information is for anyone who signed up and may (but likely doesn't) contain any information that can be traced back to you. However, credit card authorizations generally require that you enter the name on the card and the billing address of the card. So people who paid for the service are at much greater risk of exposure.
I've looked through the actual data. It's organized like you'd expect database dumps to be organized. There are multiple tables with varying pieces of information. You can't just "look up" someone without matching up the member number from table to table.
If someone used a their legitimate (commonly known) email address, then you could search that table to get their member number. Then from there, you could cobble together their "preferences".
Searching by name is trickier. The "name" data only appears with the payment data, and there are different files for each day (literally) since 2008. However, someone who's reasonably intelligent could append all of the payment tables together so they could search by name across all of the data at once. Again, you could back into other information once you knew the member number.
My guess is that AM will push takedown notices to websites who allow searching by first/last name. Searching by email isn't too helpful because I'd guess most people used a real (but not publicly known) email address.
By email "not being verified", they mean that you didn't have to click a link that was sent to you in order to continue using the site. For instance, this forum requires that you verify your account before you can post. That means there's a ton of "fake" information in the system. These likely won't have credit card info (and real names) attached though.
The username/membership information is for anyone who signed up and may (but likely doesn't) contain any information that can be traced back to you. However, credit card authorizations generally require that you enter the name on the card and the billing address of the card. So people who paid for the service are at much greater risk of exposure.
I've looked through the actual data. It's organized like you'd expect database dumps to be organized. There are multiple tables with varying pieces of information. You can't just "look up" someone without matching up the member number from table to table.
If someone used a their legitimate (commonly known) email address, then you could search that table to get their member number. Then from there, you could cobble together their "preferences".
Searching by name is trickier. The "name" data only appears with the payment data, and there are different files for each day (literally) since 2008. However, someone who's reasonably intelligent could append all of the payment tables together so they could search by name across all of the data at once. Again, you could back into other information once you knew the member number.
My guess is that AM will push takedown notices to websites who allow searching by first/last name. Searching by email isn't too helpful because I'd guess most people used a real (but not publicly known) email address.
By email "not being verified", they mean that you didn't have to click a link that was sent to you in order to continue using the site. For instance, this forum requires that you verify your account before you can post. That means there's a ton of "fake" information in the system. These likely won't have credit card info (and real names) attached though.
Popular
2











