Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

keepgrabbing2.py? #1

Open
speedplane opened this issue Mar 19, 2015 · 9 comments
Open

keepgrabbing2.py? #1

speedplane opened this issue Mar 19, 2015 · 9 comments

Comments

@speedplane
Copy link

Any idea what happened to keepgrabbing2.py? It's mentioned in the indictment, paragraph 29:

https://www.docketalarm.com/cases/Massachusetts_District_Court/1--11-cr-10260/%20USA_v._Swartz/53/

@sprky0
Copy link
Owner

sprky0 commented Mar 28, 2015

Good question -- let me know if you're able to find a scan anywhere, would love to include it here as well. I poked around but haven't had any luck yet.

@speedplane
Copy link
Author

Interestingly, all of the files in Aaron's case were set to be publicly released, following a complex redaction procedure between Aaron's Estate, JSTOR/MIT, and the US Attorney General's office.

So someone should have keepgrabbing2.py and may be allowed to share it publicly.
It may make sense to reach out to Aaron's former attorney, Michael J. Pineault of the firm Clements & Pineault, LLP (email: mpineault at clementspineault.com).

@davidrdz93
Copy link

What is "Cookie: TENACIOUS=" in line 14?

@speedplane
Copy link
Author

I sent an email to Mr. Pineault inquiring about the documents that were set to be made available.

@davidrdz93
Copy link

Great

@davidrdz93
Copy link

Le us know!!

@aashumallik
Copy link

does anyone know if the documents were made available

@davidrdz93
Copy link

Why would you run curl --socks5 command with -H with a long random number? Does it confuse the server ??

@sprky0
Copy link
Owner

sprky0 commented Sep 21, 2017

@davidrdz93 That argument (-H) adds a header to the HTTP request w/ cURL. In this case, the header is spoofing a client held cookie, named TENACIOUS, which is for each request populated with a random number.

As to the reason for this, it likely has something to do with JSTOR's API, for example, perhaps it consumes a cookie called TENACIOUS which relates to user sessions for the purpose of rate limiting. Anyway, way to know for sure would be to inspect some real requests for comparison to what this generates.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants