So all this talk of them giving out the info basically free online is jack ? If it′s not then what makes them different form the crooks selling the information, they′re just making it easier for the buyer by giving it away.
And if Lulsec does not have any intentions of giving out the info because they are "oh so good" then how are they going about forcing Sony to up their security ? And then it has to be without any side effects to the consumer.
Answer those two and I may change my mind.
lulsec only published the email address and password. They only published a fraction of the 1 million accounts they had access to. They also had access to coupons and administrative databases as well as addresses and credit card info. They didn't bother going after those because they only needed a portion of it for "cred" They said their crappy hardware couldn't download it all in any decent time.
Had a criminal organization done it, they'd use a botnet to get all the information. All 1 million emails would be compromised instead of just 50k. My address and credit card info would have been taken. Fraudulent coupons would have been made. They'd have my demographic information which would mean is all they'd need is my SSN to steal my identity (and with all the rest of the info they took, getting my SSN would have been a trivial task)
I never once said Lulsec was "oh so good". I called them greyhat, because that is what they did. They didn't do it the whitehat way, but neither did they do the above.
It's pretty simple to see what the lesser of two evils is.
As for forcing Sony to fix it: this is highly publicized. Sony has to fix it less lose face. In the event of PSN, Sony was audited by the Payment Card Industry -- they couldn't turn PSN back online until the PCI approved it.
Note: I do not approve of Lulsec's actions. They didn't do it the whitehat way, but I DO approve of whitehats. Also, I feel that even though Lulsec didn't do it the right way, them hacking Sony pictures is a lesser evil than Sony continuing to run an insecure and highly vulnerable network and a REAL criminal organization attacking it.
Edit: In case you don't know what would be considered "whitehat" it'd be someone (or group of someones) who does the following: They discover a security flaw in a company's setup. They then contact the company. If the company does nothing about the flaw they tell the media/publish the vulnerability (which is usually already a well known vulnerability in the security world, just not that company X is affected by it)