Epstein File Data Security Update: Raw Code Found in Emails
Briefly

Epstein File Data Security Update: Raw Code Found in Emails
"After a recent release of files related to Jeffrey Epstein exposed victim information, credentials and other sensitive data, new reports suggest the Department of Justice (DOJ) did not adequately redact all files, as select blacked-out documents contain raw email data. This discovery was made by Mahmoud Al-Qudsi, Founder of NeoSmart Technologies, a private software research and development firm. Al-Qudsi detailed his findings in a blog post, stating he'd come across it by accident."
"While searching the files, he uncovered something noteworthy: some emails contained pages of base64 code - which is the way SMTP email protocol codes attachments for transferal over wire. The result is "seemingly meaningless page after page of hex content," but Al-Qudsi recognized it for what it was: raw email data. According to , this enabled Al-Quisi and an online community experienced in cyber forensics to decode the email attachment and reconstruct it."
The Department of Justice failed to fully redact certain released files related to Jeffrey Epstein, leaving blacked-out documents that contained raw email data. Mahmoud Al-Qudsi, founder of NeoSmart Technologies, discovered the exposed information while searching the release and reported finding pages of base64 code used by SMTP to encode attachments. Those base64 sequences allowed Al-Qudsi and an online cyber-forensics community to decode and reconstruct some email attachments. Only a subset of files contained usable raw code, so most documents remained unrecoverable by this method. The inadequate redaction nevertheless resulted in leaks of sensitive victim information, credentials, and other protected data.
Read at Securitymagazine
Unable to calculate read time
[
|
]