Analysis of Black Market Reloaded user database leak

332k user account leaked and analysed Don't worry, no passwords in this dump, just some statistical data.


Comments


[3 Points] swiftbound:

This was not a "database leak". All of the information could have been obtained by crawling public user profiles. The only exception is the supposed BTC addresses, none of which are accurate.


[1 Points] pugetF:

It's only metadata, right? /s


[1 Points] None:

Wow this is really great stuff. Shows just how effective a ddos is, and also gives us a look at the effects of the SR bust and subsequent migration.

If someone wanted a payday their best bet would be to attack the largest market to increase their own share, then run with the funds that flow in.


[1 Points] JohnGalt6:

THe mistake in the first place is keeping too much data regarding an individual in one location. Since the BM is anonymous, if it gets hacked, who ya gonna tell? Who did the crime happen to? How could a police report look like with what data to prove what? With that, the original programmers need to consider all points of view on the infiltration of their data. When it happens, what data could possibly be taken and what can be done with it? BMR might be well programmed, but it is done so by a programmer with no Law Enforcement experience and little experience in the Criminal world, so how can they best secure you without knowing?