Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Investigators soon discovered that a log-in to the victim’s iCloud account had come from an internet address at Chi’s house

If the attacker was really not covering his tracks, perhaps Apple may have flagged hundreds of different iCloud account logins originating from the same location as something to look into?



That's not really a reliable/actionable signal overall - my previous employer had like 20,000 employees NATed behind a single IP.


> my previous employer had like 20,000 employees NATed behind a single IP.

If so, it’s incredibly unlikely that all 20k were online simultaneously. If they were, each person could only open ~3 TCP sockets to the internet (even if via a proxy if dealing with individual login sessions) at a time before you’ve run out of ports.


even though you're probably right on the first part, the second part is false. while most NAT implementations operate as you describe, called "port-restricted cone NAT", some implementations allocate the external port only for a specific destination address, called "symmetric NAT".


TIL, thanks!


IP NATing is a common thing done by most isps, you can literally have 100s or even thousands of users using the same ip.


There isn’t enough information in the linked article to reveal the attacker’s methods. Do you have further information or are you speculating?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: