$ cat /var/log/apache2/access.log.1|grep 65.52.100.
65.52.100.214 - - [21/May/2013:09:38:48 -0700] "HEAD /volunteer/ HTTP/1.1" 200 277 "-" "-"
$ cat /var/log/apache2/access.log*gz|gunzip|grep 65.52.100.
65.52.100.214 - - [07/May/2013:18:46:29 -0700] "HEAD /2013-makers-2/ HTTP/1.1" 200 277 "-" "-"
65.52.100.214 - - [03/May/2013:00:19:07 -0700] "HEAD / HTTP/1.1" 200 277 "-" "-"
65.52.100.214 - - [20/Apr/2013:01:03:11 -0700] "HEAD /volunteer-registration-2013/ HTTP/1.1" 200 277 "-" "-"
$ whois 65.52.100.214
NetRange: 65.52.0.0 - 65.55.255.255
CIDR: 65.52.0.0/14
OriginAS:
NetName: MICROSOFT-1BLK
Really, why trust a third party if your communications are supposed to be secure? We all know that mobile phone carriers store SMS messages for long periods of time, so why should it be surprising to anyone that someone who provides a free service is going to harvest data out of it?
It shouldn't happen but at the same time there is no such thing as a free lunch either.
No comments:
Post a comment