Internet Archive breached again through stolen access tokens

Security Failures and Incident Response

  • Many commenters see two breaches in quick succession as evidence IA is a “soft target” with poor security hygiene.
  • Not rotating exposed API keys after the first breach is widely criticized as a basic failure.
  • Some note it’s hard for a small, volunteer-heavy org without a formal security team to “do all the first things” quickly.
  • Several urge IA to hire dedicated security staff; others argue even “industry standard” security is often just checkbox compliance and won’t stop all mistakes.

Leadership, Governance, and Mission Creep

  • Strong calls for leadership change; claims IA’s priorities (e.g., aggressive copyright fights) put its core archival mission at risk.
  • Others defend current leadership as one of the few willing to withstand constant legal peril and stay true to a human-centric mission.
  • Debate over whether IA should focus strictly on archival vs. also acting as a copyright reform activist. Some say activism endangers the archive; others see the two as inseparable.

Copyright, Access, and Libraries

  • Deep divide on IA’s lending of in-copyright books and hosting of media:
    • Critics say this is akin to Pirate Bay, creates huge legal liability, and distracts from preservation.
    • Supporters argue current copyright terms are effectively “forever” and exclude much of the world from knowledge; IA’s access is framed as a “Robin Hood” role.
  • Discussion on hiding vs deleting archived pages for legal reasons; some argue IA mostly hides due to copyright but keeps copies for researchers.

Decentralization, Mirrors, and Resilience

  • Strong interest in decentralized or distributed backups (torrents, IPFS, Arweave, LOCKSS, Freenet/Hyphanet, ArchiveBox).
  • Repeated themes:
    • Hard to get enough volunteers to donate storage and bandwidth, especially for “boring” content.
    • Torrents are good for popular data, bad for long‑term reliability of obscure items.
    • IA’s existing torrents are often broken or stale; IPFS experiments described as slow and operationally painful.
  • Some propose user-friendly “donate X TB” systems; others argue volunteer storage is too unreliable for primary preservation but useful as a backup of IA itself.

Attackers’ Motives and Ethics

  • Motives of the breachers are unclear: theories range from “script kiddies” to political or state-linked actors, though nothing conclusive in the thread.
  • Some condemn attacking a “library”; others see the attackers as forcing IA to fix dangerous negligence and treat this as a grim but useful wake-up call.