Menu
Disqus scrambles after leak fuels Swedish tabloid exposé

Disqus scrambles after leak fuels Swedish tabloid exposé

The company's API leaked information that allowed a tabloid to link offensive forum comments to email addresses

Disqus is updating its widely-used comments platform after a Swedish tabloid exposed politicians and other public figures for allegedly making highly offensive comments on right-wing websites.

The Swedish daily Expressen, working with an investigative journalism group, said it uncovered the identity of hundreds of people who left offensive comments at four right-wing websites through their email addresses. It then confronted the authors of the comments, many of whom freely admitted to writing them.

Later on Tuesday, Disqus said its network had not been breached and that it did not leak email addresses. The journalists appeared to have abused a feature it used for a third-party service, it said.

Based on information from Disqus and other observers, a general picture of the journalists' method has emerged.

Disqus used a third-party service called Gravatar from Automattic, the company behind the WordPress software. Users can upload an avatar, which will then appear on any Gravatar-enabled website.

A Disqus API (application programming interface) fetched avatars from Gravatar using the hashed email addresses of registered users. A hash is a cryptographic representation of a value processed by an algorithm.

For example, the email address "idg@idgnews.com" when processed by the MD5 algorithm appears as this hash: "0ff3eeab2b765f017a526bbddd328c3b."

The journalists likely collected the nicknames of commentators from the websites, then pinged Disqus' API to see what MD5 value was returned. They could have gained access to Disqus' API by creating an account, according to Eaxbreakparty, a blog run by a self-described cryptography enthusiast.

With that value in hand, a couple of scenarios are possible. If the journalists already had a database of personal email addresses, they could generate the MD5 hash for those addresses and then see which ones match the hashes returned by Disqus.

Also, it is possible, but difficult, to convert MD5 hashes back to their original value, which would give them email addresses with which to perform further research.

Disqus said in a statement that "to use our API or service for such purposes, is a breach of our privacy guidelines." The account believed to have been used for the research would be terminated, it said.

The company said it would also disable Gravatar and remove "the MD5 hash email addresses from the API. We will evaluate any further changes that will need to be made based on these actions."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securityDisqus

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments