The Jester has posted a link to the data exfiltrated during last week's Webkit exploit aimed at curious mobile device users who scanned the QR-code posted as an avatar on his Twitter account and then were cross-referenced with a database of targeted jihadi and Anonymous operatives:
"The resulting raw dump of the verbose output log from this exercise can be downloaded using the link below – although it’s encrypted with my PGP Public key. Have fun with that," Jester stated.
The update was followed by The Jester's oft used credo, "There’s an unequal amount of good and bad in most things, the trick is to work out the ratio and act accordingly.
When asked via direct message how the encrypted file could be unlocked, Jester replied "I don't release info to public, that's an Anon tactic. The plaintext raw version is in the correct hands tho. I got only one thing in this life. My integrity. I wont be painted with their brush. Even if I am seen as similar. Peace."
"Again its a multi faceted op. It happened. But not releaing the dump directly to public keeps my integrity and leaves the guilty with work," Jester continued.
The operation was intended to snare targets The Jester had previously identified and aggregated in a database, while leaving non-targets unscathed.
Those who had scanned the QR-Code with any Android or iPhone mobile device and corresponded to the set of previously identified targets ended up having their address books, texts and emails exfiltrated and now posted online via this PGP file.
The full write up of the exploit by The Jester along with screenshots and exploit code samples can be found here: