Affected services:
aapi.tar.bz2 admins.tar.bz2 ads.tar.bz2 alice.tar.bz2 analytics.tar.bz2 antiadblock.tar.bz2 antirobot.tar.bz2 autocheck.tar.bz2 balancer.tar.bz2 billing.tar.bz2 bindings.tar.bz2 captcha.tar.bz2 cdn.tar.bz2 certs.tar.bz2 ci.tar.bz2 classifieds.tar.bz2 client_analytics.tar.bz2 client_method.tar.bz2 cloud.tar.bz2 commerce.tar.bz2 connect.tar.bz2 crm.tar.bz2 crypta.tar.bz2 customer_service.tar.bz2 datacloud.tar.bz2 delivery.tar.bz2 direct.tar.bz2 disk.tar.bz2 docs.tar.bz2 drive.tar.bz2 extsearch.tar.bz2 fuzzing.tar.bz2 gencfg.tar.bz2 groups.tar.bz2 helpdesk.tar.bz2 infra.tar.bz2 intranet.tar.bz2 investors.tar.bz2 it-office.tar.bz2 jupytercloud.tar.bz2 kernel.tar.bz2 library.tar.bz2 load.tar.bz2 mail.tar.bz2 maps.tar.bz2 maps_2.tar.bz2 maps_adv.tar.bz2 market.tar.bz2 metrika.tar.bz2 mobile-WARNING-notfull.tar.bz2 nginx.tar.bz2 noc.tar.bz2 partner.tar.bz2 passport.tar.bz2 pay.tar.bz2 payplatform.tar.bz2 paysys.tar.bz2 portal.tar.bz2 robot.tar.bz2 rt-research.tar.bz2 saas.tar.bz2 sandbox.tar.bz2 search.tar.bz2 security.tar.bz2 skynet.tar.bz2 smart_devices.tar.bz2 smarttv.tar.bz2 solomon.tar.bz2 stocks.tar.bz2 tasklet.tar.bz2 taxi.tar.bz2 tools.tar.bz2 travel.tar.bz2 wmconsole.tar.bz2 yandex_io.tar.bz2 yandex360.tar.bz2 yaphone.tar.bz2 yawe.tar.bz2 frontend.tar.bz2
Also uploaded file lists from most of archives:
https://arseniyshestakov.com/2023/01/26/yandex-services-sour...
> All files are dated back to 24 February 2022.
If a coincidence, pretty interesting.
Unlikely that was the day of download, it's common practice to mask last-modified/last-accessed/created-at timestamps in dumps, by setting it to some significant date or just initial unix timestamp.
So it makes sense they stopped committing to other repos somewhat around that date.
I don't have any inside knowledge now, but my guess would be that the leak is from 'on-prem' github.
Deleted Comment
Also, such data collection abilities are generally limited to governments, so it was clear that many of them (US first and foremost) would ask for exclusion of certain individuals, and so forth, and so on, so the public tools were crippled.
Yandex image search does have some facial recognition, but it also seems bit-starved and/or mixed with text search (there's a bigger chance to match if the name and surname is present).
Also, Google is pretty Victorian about porn these days. It's almost like it has a whitelist of “acceptable” porn sites to suit the tastes of potentially angry old ladies.
the regulations don't apply to Microsoft apparently, because even goddamn Bing has been better at it than Google for years now.
Deleted Comment
https://www.google.ca/maps/place/Centre+P%C3%A9nitentiaire+d...
A quick trip over to Yandex, and there they were in their full glory:
https://yandex.com/maps/10502/paris/?l=sat&ll=2.340173%2C48....
Archive links:
https://archive.today/h5XJs
https://web.archive.org/web/20230125224316/https://breached....
https://i.imgur.com/rxYINhF.png
Dead Comment
Yandex source is cool. But there are a lot of leaks with people private data
The US authorities move mountains for TornadoCash, Z-Library, etc... why leave this one?
https://raidforums.com/
It's a cat-and-mouse game that will likely never end.
Deleted Comment
Nobody is moving mountains for those, what makes you think that?
EDIT: For example, here: https://ospkibook.sourceforge.net/docs/OSPKI-2.4.7/OSPKI-htm...
or here: https://docs.vmware.com/en/VMware-NSX-Data-Center-for-vSpher...
or: https://www.ietf.org/archive/id/draft-bre-openpgp-samples-01...
Likewise if someone searched HN for this string he'd find your comment (:
Though I would expect these keys to be just some stub config values which allowed engineers to quickly run the shit locally.
It's not a revenge of the the regime. A decade ago it was a different company, now they all are completely under the cap of FSB, it's basically a Lubyanka filial. It's serfdom all over again, not that strange it got leaked by some unhappy employee.
There are shitheads everywhere.
Sadly, Yandex is not a neutral company and is just another weapon in Putin's hands.
[1]: https://misinforeview.hks.harvard.edu/article/a-story-of-non...
[2]: https://t.me/AlekseiKudrin/48
I assume a drastically increased attack surface and potentially a boon for open-source development? Anything else?
Eating into their business would require much more than source code, but of course an analysis of the code could lead to finding more security issues.
> potentially a boon for open-source development?
That'd be an absolute copyright/licensing nightmare, just because the code was stolen and published doesn't mean it is now "open-source".
For the record, I don't disagree with you on the licensing/copyright front.
I expect the code to be mostly worthless. There is just too much of it, it's poorly documented and, oftenly, just badly designed and badly written.
And the actual important data (index shards, voice models, all that crap) is not in these dumps.
Won't be a boon for OSS, any author would be idiotic to read stolen source code and then decide to create a OSS library/project based on what they learn from it.
Ah, but will it make its way into Copilot? That could be interesting.
What? Why? Isn't this what software developers do — they read a lot of code; they find ideas they like; they mix them together with their own ideas while building something. Isn't this how learning works in general?
This is naive. This generation seems very sensitive to the prospect of computer crime.
The stolen source code will almost certainly be read, and if deemed novel enough will be turned into open source projects. It may be tough to figure out those projects are derivatives of stolen code, but most likely they will be passed around in black market repos.
I looked through some of my telegram channels to see if anything has been posted yet. Lo and behold, the stolen files are in fact available… from a server in Ukraine.
With the current geopolitical situation going on, is this really true? (From a western developer's perspective)
Still not a solid foundation to start with, though.
Solution: Take kernel of the idea and implement it yourself.
Deleted Comment
Deleted Comment