tag:blogger.com,1999:blog-37798047.post33785789742267124..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: A lesson in BitTorrentDavid Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-37798047.post-65238966769405250822015-08-21T09:58:59.154-04:002015-08-21T09:58:59.154-04:00So, if nobody has the entire data set, does that m...So, if nobody has the entire data set, does that mean that somebody is extracting/exfiltrating the data from AshMad real-time, and then copies are being made from that real-time extraction/exfiltration?<br /><br />Gary Hornhttps://www.blogger.com/profile/04706829446650410906noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-29534871637689891292015-08-21T09:28:18.369-04:002015-08-21T09:28:18.369-04:00Where can we find the actual 2nd data dump?Where can we find the actual 2nd data dump?Anonymoushttps://www.blogger.com/profile/17346490341547755482noreply@blogger.com