bobthemonkey13 writes:
"It appears that Microsoft's 'secure' E-Book system has been cracked. MIT Technology Review is reporting that an anonymous programmer has figured out how to bypass the 'advanced antipiracy features' in Microsoft Reader. This sounds a lot like what Dmitry did except for two things: The MS E-Book hacker has (wisely) decided to remain anonymous, and he's not publishing his program. God bless the U.S., where moving a book from your home to your office is a federal offence."
Along similar lines, an Anonymous Coward indicates this
story at USA Today titled "Expert Hacks Hotmail in 1 Line of Code."
"I'm in awe! Unless someone can figure out how to execute pseudocode or half a line this isn't beatable. I hope this get's fixed or the whole future of pay-per-view web services could be impacted. :-q" Good thing Microsoft
isn't quite sure what to do with all this universal-password stuff. (Thanks to
Sacha Prins.)
Jamie adds:
In other news about poor security where you least expect it,
Kitetoa
informed
Veridian
a little while ago that:
"Any script kiddy can root your web site. And... By the way... Someone already did it (as you should have seen at www.veridian.com/upload/ if you knew anything about internet security)."
I don't know what that URL gives you now, but as of this writing, and for the last several hours, it's read:
fuck USA Government
fuck PoizonBOx
contact:sysadmcn@yahoo.com.cn
This is the same Veridian that the Defense Department picked to
track computer network attacks
on DoD systems, specifically
attacks coming from China.
this is what freenet was made for! (Score:3, Insightful)
Comment removed (Score:5, Insightful)
Re:this is what freenet was made for! (Score:5, Insightful)
Re:this is what freenet was made for! (Score:3, Insightful)
Try reading Martin Luther King Jr.'s papers. "Letter from a Birmingham Jail" is textbook legal philosophy on civil disobedience.
http://www.almaz.com/nobel/peace/MLK-jail.html
Derek
Re:this is what freenet was made for! (Score:3, Funny)
No, don't email to him, he's using hotmail!
Re:this is what freenet was made for! (Score:2)
I think, that in the case in question the anonymous programmer has done enough to make the security flaw public (he demonstrated it to the author of the article AFAIK) while opening himself not too wide to lawsuits. Now releasing the code (even on freenet) wouldn't be a good course of action, since this might give microsofts lawyers enough of a lever to subpoena his name from MIT Tech. Rev. It would be inconsistent with his previous course of action too.
Maybe an even better course of action would be, to anounce a security hole but refusing to let out anything else about it "for fear of being sued". One might even go as far as saying that an exploit was never implemented, since even that would be against the DMCA. But one would surely need some lawyers to test the grounds of this.
Maybe the security experts should just leave it up to the writers of trojan horses, worms and virii to find security holes in products whose manufacturers decide to rely on the DMCA for their security and then just point out the number of exploits. I don't know how better to get home the point, that a security hole exists, regardless if it's made public or not.
Re:this is what freenet was made for! (Score:2)
Yeah. I'm sure that's how people in other police states (I mean outside the US) see it.
They all realize that if they disobey, say, the Chinese government, that they need to do it in full public view and be accountable. Otherwise, it is pointless.
Don't assemble and meet in secret. Don't exchange information secretly. You need to be accountable.
Heck, FreeNet should be illegal. It destroys the accountability part of civil disobedience. I'll write my congresscritter.
Re:this is what freenet was made for! (Score:3, Insightful)
I think yours is a reasonable but incomplete view of "civil disobedience." If emulating the campaigns (or at least the non-violent parts) of King and Gandhi and Biko is what someone wishes to do, then they do need to be willing to face the consequences.
OTOH, a single person cannot succeed. All of the civil rights campaigns that succeeded did so because of their numbers. The campaign takes a long time and needs to pile small victory upon small victory.
If you do it by yourself, you stick up like a nail and get hammered down. So instead of one person publishing it, try to get hundreds. Perhaps the EFF or EPIC or some such group can help lay the strategy for a test case. It may be that reader software is not the appropriate vehicle to bring a DMCA challenge. These sorts of changes don't just happen, they are made. The landmark Brown v. Board of Education was the ultimate school desegregation case but dozens of earlier cases were brought at the lower levels to lay the groundwork that made the Supreme Court decision inevitable.
Finally, anonymous action is not the same thing as cowardice. It isn't traditional civil disobedience, but it isn't cowardice either. Similarly, rushing in may be foolish rather than brave. Pick the fights you have a chance to win and then prepare as thoroughly as you can. You need to be able to risk failure, but you don't have to seek it out.
Re:this is what freenet was made for! (Score:2)
danheskett is right, this must be released with somebody standing up for it. Doing it anonymously will only cause further demonization of hackers. Also, one should have a press-release ready saying it is being released as a genuine act of civil disobedience. You need the media spins right from the first second.
Re:this is what freenet was made for! (Score:2)
If it's organized as a campaign to get say, 10,000 individuals releasing it on every website, FTP, etc. saying they wrote it there is no way to prove who actually wrote it. So, you still be held liable for Trafficking a circumvention device but it's not as if they are going to throw you in prison or try each and every person.
I'd be willing to do it.
Microsoft Security Model - implemented via DMCA (Score:3, Interesting)
Sarcasm aside, does it really matter how secure hailstorm really is, ig Microsoft can sue into oblivion anyone who publicizes or even researches security exploits related to the system...?
--CTH
Re:Microsoft Security Model - implemented via DMCA (Score:5, Insightful)
Then some well-paid foreign hacker can crack the server, launch the missile at Canada and all heck breaks loose. Or some terrorist sympathizer can funnel money to his buddies, or simply cause havoc in major US financial systems.
Do you really think the best hackers in the world are all boring enough to work for the NSA, or even born in the US? Are we really supposed to feel secure knowing that the main obstacle preventing our "secure" systems all over from being cracked is the danger of being cracked? Talented hackers are not script kiddies. Talented hackers won't be leaving little notes like "j00 4r3 0wn3d". Talented hackers just might not care about the things the rest of us care about-- and they may be largely immune to legal action.
I think it's important that we consider the DMCA not only an affront to our traditional rights as consumers (i.e. Fair Use), but a danger to national security.
The whole thing is a bit like making it illegal to publish reviews of various locks from the hardware store. Yeah, it will keep consumer reports from telling shoppers which locks are high grade titanium or alloys and which locks are flimsy plastic, but it won't keep crooks from figuring out which is which and having a field day breaking into houses secured with the plastic locks.
Re:Microsoft Security Model - implemented via DMCA (Score:2)
I'm not too worried about that. Most of Canada is nearly uninhabited, so you'd probably only kill some deer and the rednecks who were hunting them. Given the average American's knowledge of Canadian geography, I'm not too worried about you guys finding our major population centres, even though they're pretty much all within a 100 kilometres of the US border (and yes, that's how we spell "centres" here).
Seriously, though, I must urge my fellow Canadians to visit this government site [ic.gc.ca] and send them your comments on the proposed DMCA-like revisions to Canadian copyright law.
Up close and personal with the WIPO treaties (Score:3, Informative)
For those, who are unfamiliar with the history of Intellectual property law, the EFF has a good primer [eff.org].
--CTH
Civil Disobedience? (Score:5, Insightful)
No. The whole point of civil disobedience is that a law or regulation is openly defied in a very public manner, and the transgressors challenge the authorities to enforce the law. The belief is that should the larger public become aware of the law and the inappropriate punishment that comes from breaking it, the government will feel compelled to change the law. As well, if enough people are openly breaking this law, the system will get clogged up with trivialities.
Civil disobedience is not hiding in the shadows and skulking around under cover of anonymity.
And this gets a +5 insightful? WTF?
Re:Civil Disobedience? (Score:2)
Here. Read this. [actupny.org]
Their concept of civil disobedience is a little different than Thoreau's in that they don't seem to favor individual acts. They are talking about public mass demonstrations. But what demonstrations are we talking about here? A million man march on Redmond? I am not sure that would do a thing.
File this one under "Monkey Wrench" [abbeyweb.net]... You can debate the morality and ethical implications at your leisure, but stop calling it civil disobedience, and start calling it what it really is [wordorigins.org](dig the Star Trek reference). It might make it harder to justify, and easier to vilify, n'est ce pas?
Security: Antonyms: See Microsoft (Score:4, Interesting)
Re:Security: Antonyms: See Microsoft (Score:5, Insightful)
Actually, they are.
The other day, I was on the hall where a good chunk of my professors [uah.edu] have offices. I got into a discussion with a few of them, and the gist was this:
Of course, I got to wondering about that; we talk about White Hats and Black Hats, but even the Black Hats serve a purpose, if your goal is to rid the world of Microsoft. I'm not sure that it is for me--I'd be happy to use their products if they would code good stuff. [Posted from IE6 on Win2K, but only because I have to have a Windows box to do my school crap...]
But to the point, the end users are getting frustrated with all the security holes. In this case, these guys don't want their research exposed by something like SirCam, which could very easily happen. I think they'd happily go for a switch if solid interoperability with those Left Behind in the Microsoft world could exist.
And hey, remember that these are aerospace engineering professors, who aren't always at the vanguard of computing technology. I mean, I've had to do research with them using F77...
Re:Security: Antonyms: See Microsoft (Score:2)
Ummmm, professors never design aircraft. They just teach those that may do so someday.
But the logic is clear here:
They didn't lose any files, but many of 'em got the virus, IIRC. That's unsurprising--it hit the corporate world around here, and their emails are in enough people's address books [heck, mine, since I have to converse with two of 'em regularly!]
Their point is this: if the virus goes beyond annoyance [maybe you have to wipe and reinstall--the department does good backups] to their research actually being sent out, a new line has been crossed.
If any virus has shown the ills of Microsoft coding philosophy, SirCam is it.
Re:Security: Antonyms: See Microsoft (Score:2)
ILOVEYOU showed the coding ills of Microsoft Outlook.
Anybody who didn't go in and fix there systems after ILOVEYOU deserved whatever they got. Sheesh
Any company that was hit by Sircam should immediately fire their IT staff responsible for email.
The company I work for didn't have any problems with Sircam. Never even made it in the door.
Re:Security: Antonyms: See Microsoft (Score:2)
You've obviously never been around an aerospace engineering professor. They may have a Ph.D., but most of them are absolutely clueless when it comes to computing technology. I've heard more [l]user questions from them than I have from many, many others...
Re:Security: Antonyms: See Microsoft (Score:2)
A person with a PhD is extremely skilled in one and only one subject.
Everything else, they know less than the average joe off the street.
It's really quite terrifying.
Re:Security: Antonyms: See Microsoft (Score:2)
That's not quite true or fair.
I work at a NASA contractor. I recognize the value of F77 [and F90] code. For example, GFSSP recently won an award for thermodynamic modeling, and it's written in FORTRAN. [I can't remember if it's F77 or F90; I'd have to ask Dr. Majumdar next time I see him.] Depending on what you're doing, FORTRAN is unbelievably powerful.
There's a reason it's still taught today. I understand those reasons, but in any case, the various levels of FORTRAN are hardly at the vanguard. It's simply the venerable, powerful number-crunching language it's always been. It has its role, and when used appropriately, it's great.
Too bad I've forgotten much of the F77 I learned...well, learned is a bad term, because my instructor was pathetic! =)
Re:Security: Antonyms: See Microsoft (Score:2, Insightful)
Re:Security: Antonyms: See Microsoft (Score:2)
I'm normally not one to hate on Microsoft stories, (Score:2, Troll)
- A.P.
Re: Linux distros getting *much* better (Score:2, Informative)
A year ago I would have been much more inclined to agree with you... but it's kinda funny. As time goes on, Windows seems to have more network services, and more problems, while Linux distros are becoming more sane and simple, follwoing OpenBSD's lead...
Packet Filters != Secure (Score:2)
A packet filter is better than nothing, but it is not the answer. One should not assume that because they are "protected" by a packet filter that they are secure.
IMHO, I think that it can be argued that a proxy firewall solution is the most secure. With a proxy, there is no direct connection between a host on the secure network and the internet. The downside of course is that proxy solutions are not transparent.
The next best alternative would be a firewall that does stateful inspection. That is transparent to the user, but is not a secure as a proxy-based one.
Re:I'm normally not one to hate on Microsoft stori (Score:5, Insightful)
> But, unlike with M$ products, you can plug them, since you have the SOURCE.
And increasingly important, you can talk about them without fear of drawing a Go To Jail card.
You don't get in trouble for finding holes in os's (Score:2)
I find tons of articles, researches and legit businesses in the us where the sole purpose is to research, discover, patch and fix these risks.
On the other hand, if you break copyright laws it doesn't matter which OS you do it under, it is still "illegal".. not that i agree with the DMCA but your blinded by your beliefs in linux as being a legal place to do illegal work
Re:I'm normally not one to hate on Microsoft stori (Score:2)
You don't firewall anyway?
- A.P.
Re:I'm normally not one to hate on Microsoft stori (Score:2)
(or even an ethernet bootable machine)
(or a machine on dhcp with anytype of nis/directory server authentication).
or...
Mommy,I'm Scared (Score:4, Interesting)
First, off I can't believe that Mircosoft thinks they should be in control of so much personal information.
Second, that Microsoft thinks they can somehow keep it safe.
Third, and this is what scares me. A lot of John Q. Public will give them all this information.
Better them than me I guess.
Re:Mommy,I'm Scared (Score:3, Interesting)
Indeed. I was helping some neighbors with a computer issue a couple weeks ago and noticed they had a gator.com utility in the toolbar (Slashdot search seems hosed at the moment, but they came up recently). I asked them about it.
Basically you enter all of your details (name, mailing address, phone number, etc) and it will automatically fill them in on web forms. Now, ignoring the cross-site scripting fun you could have with this little toy, I just had to ask...
"So, basically, you give them every marketable piece of information they could want so they can provide it to others automatically?"
"Yup."
Re:Wait a minute (Score:2)
Now, IDKAG (I don't know about Gator), but while I admit your point, I'd be damned concerned that any utility like this would be sending alla this info back to Corp. H.Q. each and every time it's used. That, I think, is a legitimate concern.
Re:Wait a minute (Score:2, Insightful)
Sure, if you're looking for it. But the orig. comment was about people who were just average users and weren't nearly paranoid enough.
aren't all network connections logged?
Not necessarily; just think how much data that would be. You've got a graphical browser, right? Well, each and every picture you see has to be downloaded. That'd all be logged. You'd get tired of looking through it pretty quickly. My point is that it's easy for this sort of thing to get lost in background noise even if you know to look for it.
can multiple apps establish simultaneous connections through the same port, or does each process need it's own?
The latter, I believe...I'm no programmer type either.
Keep in mind: (Score:3, Interesting)
We know it's bunk. They ought to know it's bunk, and yet they don't.
sigh.
Re:Keep in mind: (Score:2)
Re:Keep in mind: (Score:2)
There are a lot of people out there who would suggest that rather than innovate, m$ tends to copy what other people are doing and integrate that into their OS.
Can someone provide examples of things m$ did that constitute original, innovative work?
Re:Keep in mind: (Score:2)
How about Code Red? First thing that comes to my mind would be the original, innovative PR and possibly the legal work. When it comes to spinning the ugly stuff, these guys beat out Clinton (so far).... since most people believe them.
Re:Keep in mind: (Score:2)
"For instance, Microsoft's testing uncovered the fact that 80% of users never discovered the functionality of the right mouse button"
Hmmm... Apple's usability and interface people figured that out in... er... well, the early 80s. And they didn't make "a new menu system replicating this [right-click context menu] functionality". They just provided one-button mice and designed the interface accordingly.
Sigh. I wish Apple had gotten it together.
I'm hopeful (Score:3, Insightful)
This might just be what's necessary to once and for all turn public opinion against this evil empire.
Most people don't expect security (Score:2)
Question - Hailstorm & UK DPA (Score:2, Interesting)
Any DPA experts out there?
Is there similar legislation stateside?
The MS hack (Score:4, Interesting)
With new forms of active content being added to web pages all the time, it is amazing that anything with dynamic content. I know that's vague, but that sounds like the gist of it.
Releasing the program is easy. (Score:3, Interesting)
But still, if done properly, it could be released and spread without anyone finding out who the author is. The danger is if that person ever told ANYONE about it. If he did, then he's not truely anonymous, and given enough of an incentive, someone might be tempted to talk. At least, without releasing any code, then its technically all heresay and a lot less likely to be in violation of some strange law.
I fear however that this is how it will have to be done in the future if the silly laws don't get overturned. Either that, or some REALLY important sensitive document will have to be cracked and released publicly to the embarrasment of a large organization with a lot of people chanting "we told you so" before those in power might take a second glance and realize that perhaps peer review for security is a good idea after all.
-Restil
Re:Releasing the program is easy. (Score:3, Insightful)
Am I the only one who is reading posts like this parent and mistaking this for a discussion about China? Distributing documents anonymously via FreeNet, fear of identity disclosure, friends turning you in? When the hell did America start to embody everything it is supposed to stand against?
Cheap testing... (Score:3, Insightful)
Recently they've had some holes (much like this) that you'd have to be out of your head smoking crack to miss.
Quality assurance at Microsoft is better than this when it comes to other areas. Could it just be that it's easier and cheaper to have somebody else find the holes and then, as the mega-funded publicity department goes into top gear issue a patch (where appropriate)?
Either that or Microsoft buys a lot of crack!
Re:Cheap testing... (Score:2)
Shooting ourselves in the foot? (Score:3, Insightful)
Hack hotmail in one line of code (Score:2, Funny)
while true; do telnet www.hotmail.com 80 <
Then just sit back and wait.
On a related note, i'd like to dispel a common myth. Real Programmers don't use 'cat > a.out' or 'cat
Re:Hack hotmail in one line of code (Score:2)
(BTW, just had a look at your .sig and hilite sounds like a neat idea -- I've downloaded it and will compile it at a more decent hour.)
MS Liability (Score:3, Interesting)
Now let's say that someone finds another flaw in passport (I know, hard to believe, but go with me here). Needless to say, Hailstorm users will be left vulnerable. The question is, will the Hailstorm and Passport EULA protect MS when it comes to legal liability for a) lost data, and b) copied or stolen data (loss of intellectual property, etc...)
My guess is that even if they are to blame, MS won't be legally liable. Doesn't sound like a good choice for users...
without code.. (Score:2)
I understand not wanting to be the next DMCA victim, but really, if the code isn't out there, then, it doesn't exist in my eyes.
Actually, this brings up an interesting point. (Score:4, Interesting)
What's American Express thinking? (Score:3, Interesting)
The problem, as I see it, is that American Express and others can beat their competitors to the punch by being a part of Hailstorm, providing services no one else does, but that goes with extreme risk. I guess that's why they haven't signed a contract with MS yet. It's a tough one for any company.
Re:What's American Express thinking? (Score:2)
History of screwing over partners? (Score:2)
Care to provide some examples?
The company I work for has partnered with Microsoft last year on their homeadvisor.com website. The section we worked on turned into a failure and the plug was pulled less than a year later, but Microsoft refunded to our company our investment into the site.
I knew someone else back in '94 who started a small company that was partnered with Microsoft and writing utilities for Windows NT. Microsoft helped them startup, paid for an ISDN hookup into their office so they could more easily communicate with Redmond, and then two years later bought out the company and moved them all to Redmond. The guys were more than happy to make that move!
Every company I'm aware of that has partnered with Microsoft has been treated very fairly.
Even Seattle Computing which provided the original MS-DOS was treated very well. While the initial contract was for only a few thousand, they received much more than that over time, and many of the companies employees ended up working at MS and becoming some of their early millionaire programmers.
I guess I'm curious about this well known history.
This seems like a case of "I hate Microsoft, and I'm going to say whatever I can to try to make them look bad, even though I can't really justify it."
Re:History of screwing over partners? (Score:3, Informative)
Intel. Remember Wintel? Why is Intel so pro Linux now that they're bailing out SuSE?
Another is Apple. Yes, they were very much in bed together during the development of the Mac. These days it's knife the baby.
Sun. Java got twisted by Microsoft quite nicely.
There was also the bootloader story the other day, in which the article talked about the OEMs who got preassured by MS in to only having Windows on their computers.
I'm sure there are others, I'm not so up on the history of MS (I know more about Apple). But I hope this justifies things to you enough.
The fact is, all the companies you mentioned are small fish, and the small fish are what MS plays nice with or buys out. They're no threat. But when it's a big company that could potentially hold some power over MS, they get fucked over big time. American Express is a big company that's rolling in both money and brand name. As such, they actually have something to worry about in a partnership with MS.
Re:History of screwing over partners? (Score:2)
Except Intel. Anybody who would sit there and argue that Intel has not had a tremendously successful partnership with Microsoft is smoking crack. They support Linux not in a reaction to Microsoft, but rather to expand their markets.
Your hatred will make you strong... I guess. That's what the Emperor said anyway, right?
Re:History of screwing over partners? (Score:2)
Ok, I don't know where you get this "hatred of Microsoft" thing from on me, but the fact that you keep pushing it even in the face of actual evidence that is contrary to what you have to say makes me question your interests.
If you want to trust the shark, then go ahead, be my guest. I don't hate sharks any more than I hate Microsoft, but I don't trust sharks any more than I trust Microsoft either. Microsoft does know what it's doing, and what it's doing is making money the best way it knows how. I don't fault them for that, but that doesn't mean I, or American Express, should trust them either.
You have, of course, failed to even address my initial question, as to why American Express is taking the risk of getting in to bed with Microsoft. Microsoft does have a history of screwing over its partners, as I mentioned, and who's to say AMEX isn't capable of screwing over Microsoft if they want any more than Apple or Sun was? Microsoft is in the service game now, and American Express provides a service. I wouldn't be surprised if, at some point, Microsoft decides to get in to the credit game (hey, they're always expanding in to new markets) in order to keep tight control on their service platform. That's not to say it will happen, but who's to say it won't?
Now, if you want to go and lambast me for my "hatred" then please, go right on ahead. But I'd also like it if you could try and answer my questions rather than throw names at me.
Re:History of screwing over partners? (Score:2)
You say I shouldn't trust Microsoft, but yet I am having a very difficult time trusting you.
Re:History of screwing over partners? (Score:2)
Example: (Score:3, Interesting)
Re:History of screwing over partners? (Score:2)
There are numerous examples of that.
I am always very suspicious of companies that partner with MSFT suddenly. Usually it means they'll be dead soon.
Re:History of screwing over partners? (Score:2)
Care to provide some examples?
A few come to mind:
SpyGlass
Blue Mountain Arts
TV Host
STAC Electronics
Internet Electronics
IBM
Apple
This is too easy...
Re:What's American Express thinking? (Score:2, Interesting)
Re:What's American Express thinking? (Score:3, Insightful)
Now, AMEX isn't going down because of MS or anything, but what they are doing is putting themselves in a very vulnerable position. They are basically hitching their entire online effort to Hailstorm if they go through with this, which will be a pretty big chunk of revenue someday.
Say MS decides to screw them out of Hailstorm 3 or 5 years down the line, what do they do then? AMEX may be big, but they're certaintly not capable of deploying their own version of Hailstorm. Getting in to bed with MS is a risky proposition at best, even if you're a big company.
Worm at Cracked Veridian? (Score:5, Interesting)
Well, this is strange. I'm sitting on a Windows 98 box with McAfee VShield v4.0.3 installed and virus definition files from 2001/06/13. Whenever I try to go to http://www.veridian.com/upload/ with either IE 4.01 or Netscape 4.70, McAfee pops a warning dialogue saying I have just downloaded a worm called "SunOS/BoxPoison.worm". I also have a small Perl program I can use to perform command-line HTTP downloads, and with it, I can download the page at http://www.veridian.com/upload/ without any problems.
I'm probably getting the warning because something in the HTML code matches the signature for a known worm. But still, if the message on the site isn't enough to scare people, the warning from their virus scanner certainly will!
HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Content-Location: http://www.veridian.com/upload/index.htm
Date: Fri, 31 Aug 2001 03:51:47 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last-Modified: Wed, 09 May 2001 12:53:30 GMT
ETag: "6a8163c87d8c01:943"
Content-Length: 289
(Slashcode has inserted a few spaces into the following HTML... I hope this doesn't trip your virus scanner...)
<html><body bgcolor=black><br><br><br>< ;br><br><br><table width=100%><td><p align
="center"><font size=7 color=red>fuck USA Government</font><tr><td><p align="cen
ter"><font size=7 color=red>fuck PoizonBOx<tr><td><p align="center"><font size=4 color=red>contact:sysadmcn@yahoo.com.cn</htm l>
What tripped your virus scanner... (Score:2, Interesting)
PC-Cillin 2000 Caught It As "HTML_SADMIND.A" (Score:2)
Why does anyone bother with e-book encryption? (Score:3, Insightful)
I thought one of the golden rules of any sort of engineering is that before you try to do something, work out whether you can do it or not. Then try. Otherwise, it's all just wasted effort.
Am I the only person who thinks the whole concept of e-book encryption with the goal of stopping dedicated piracy is pointless?
Encrypting the contents of a transmission between two parties so that no 3rd party can read it is do-able, and has always been the main thrust of encryption. But what people like Adobe and Microsoft are essentially trying to do is make it impossible for the second party to read the message - because as soon as you read the message, you can reproduce it.
Assume that Adobe/Microsoft encrypt this with something that will provably take an untenable amount of time to crack - say 1024-bit public key encryption (sorry, IANACryptologist, I don't know the proper term.). I won't be able to crack the book itself, but since it appears on the screen at some point, I'm going to be able to read it sooner or later - and I can copy it.E-book encryption is the equivalent of the club lock - it'll stop casual copiers, not the dedicated copier - and this approach will only work until the first dedicated copier writes a program to let everyone else do it.
The same is true of sound files, though maybe not to the same level, as the concept of digital watermarking can be applied. I still think the same rules apply. As a result, I can't help but think of the whole e-book and sound-file encryption push as smoke and mirrors, meant to convince people that bits can be made uncopyable.
I suppose what you are trying to say is... (Score:3, Insightful)
If Jim wants to send Carol some information that they BOTH don't want Bob to see, no problem. This is the intent of crypto.
However, as soon as Carol decides that she doesn't mind Bob also getting the information, it is all over. No amout of crypto can prevent that transaction.
Given this quite obvious fact, it suprises me that ANY real crypto guy would even bother touching this problem.
Re:I suppose what you are trying to say is... (Score:3, Insightful)
Well,
Jim = Publisher
Bob = Your computer
Carol = You
It works fine as long as your computer is not allowed to work for you, but instead works for the publisher - which is what the DMCA is all about: making it clear who your computer/DVD player/ebook reader actually belongs to and works for, and that you are merely a servant to it (What? You say you bought it? HAHAHAHAHAHA - you probably paid more for it to install the functionality so it would obey us!).
If the forces of evil thought that these technologies could work, they wouldn't have needed to buy the DMCA and WIPO (legislation costs!) Their agenda is very clear - to wrestle the control of the agents away from the users, so that those agents can act against and control them, returning customers (those things that used to be people when they were capable of cognent thought) into their rightful position as passive money pumps in the global economy.
Engineering != Marketing (Score:2, Funny)
Profit (Score:2)
A: Profit
e-book encryption is not designed to stop dedicated "cracking" attempts. It's not even designed to slow it down. Think about it for a minute. These weak protections are there in conjuction with the DMCA to facilitate the licensingmuch cheaper to produce and distribute.
e-book encryption exists for the sole purpose of proping up an otherwise impossible business case. With physical media (i.e. a soft cover book) if I were to reproduce and distribute the books, I would not be able to sell them for less than the publisher, and still make any kind of a profit. The same is not true with el
Re:Why does anyone bother with e-book encryption? (Score:2)
Internal MS security problems (Score:3, Interesting)
The place to ask questions to other developers internally is via Outlooks groups (like usenet), it's surprising there isn't a better channel to converse with other Microsoft developers, maybe there is, but that's all I knew about. Anyway, so I posted a question to the IE-dev group about my problem. The response was surprising, the lead PM of IE started flaming me, telling me about how Microsoft can not have any more exploits in IE, how I my manager would be informed etc..
I guess I should have mentioned that what I was doing was only going to go out to a few select terminal ill users.
The point I'm trying to make is that Microsoft is a large company made up many small groups which don't necessarily talk to each other, I'm not saying this in there defense, but it helps explain how so many problems can arise over and over again. Even if I had just went ahead and implemented this IE hack into something major I don't who would have held me accountable, as far as I know software does not need to go through a standard security audit, each group has there own QA which will vary wildly.
-Jon
A way to make a person in jail...? (Score:2, Interesting)
Cross-site scripting?? (Score:3)
I've seen a few explanations of it but they didn't make any sense. I'm slow like that.
Re:Cross-site scripting?? (Score:5, Informative)
Most of the time, when you let users type something, you don't mind showing it back to them (they typed it after all). But with cross-site scripting, when you visit www.haxor.com, they'll provide you a link to www.phpnuke.org, but take advantage of the fact that phpnuke.org will display whatever that user has typed in.
Normally this isn't a problem, but there are people who are really good with javascript that can basically email your cookies to somebody@haxor.com after you've clicked that link. Once they've got your cookies, they can usually pretend to be you- submitting comments, stories, etc. Changing passwords. On PHPNuke, this isn't such a bad thing, but I wouldn't want anybody messing with me on my online banking site.
Take a look [phpnuke.org] at the previous example. I mailed the Nuke authors about 3 months ago telling them about the above problem. No response. Don't use Nuke for anything you want to be secure. The explanation of what just happened is that search.php displayed whatever "query" contained. I stuck a few special bits of html (ie a close bracket) into their search box. When it got re-displayed, I prematurely exited their input field. This gave me free reign to put nifty red font tags onto their page. Imagine that it was evil javascript instead.
To prevent cross-site scripting attacks, you must remember to escape all untrusted data before displaying it to a user. For PHP, it would be something like: [input type=text value="[?PHP echo htmlspecialchars($their_input); ?]"]
The htmlspecialchars function automagically kills all dangerous characters before writing the data, making it much more difficult to attack.
--Robert
Re:Cross-site scripting? (Scripted Example) (Score:2)
Try it. [phpnuke.org]
The "source" is:
<script>
alert("This site has a cross-site scripting vulnerability!")
window.open("http://slashdot.org/")
</script>
You can be much more nasty with this, popping up goatse.cx or whatever. Basically, it's possible to do anything JavaScript allows you to do.
Re:Cross-site scripting?? (Score:2)
Re:Cross-site scripting?? (Score:2, Interesting)
The basic example is that you have a web page that asks for the user's name in a text entry field and then displays "Hi [name]"
I come along and instead of entering my name I end the text entry with "> and then proceed to write javascript or whatever that performs some function on the server. It gets more interesting that that though.
Evidence? (Score:3, Insightful)
Hell, I could claim that I just broke into the CIA. I know where Elvis is and I know who killed JFK, but the DMCA won't let me tell you.
DMCA is a US-only law (Score:2, Interesting)
I'm outside the US, and have no intention of ever visiting it as long as the DMCA remains in place.
If anybody would like to publish some code that violates the DMCA, forward it to me and I'll publish it immediately on a subdomain of tech-mad.org. No need to supply your identity or any other details.
*Sigh* (Score:2)
"God bless the U.S., where moving a book from your home to your office is a federal offence."
That's funny, I recall taking home an industry mag from my IT desk just yesterday. Oh wait, you want me to copy each page in a professional photo-copier, with pictures, rebind it, and include the copyright notice the original publisher placed at the bottom, so I can have an additional copy at home. That seems perfectly legit.
Please...
Who's doing QA over there? (Score:2)
Name me another company that has this many security problems.
Gedankenexperiment (Score:2)
...Certainly true: Zero equals zero.
Re:3 == 1 ?! (Score:5, Funny)
And the line after that reads:
Well, at least you tried to read the article... that's more than most of the Slashbots.
Re:3 == 1 ?! (Score:2)
What's worse is I read the damn thing twice. Long week, long day.
Re:3 == 1 ?! (Score:2)
From the article:
Re:3 == 1 ?! (Score:2)
Then after they post the flames, they finally read the other replies to your post, and realize how redundant they are and, more importantly, that they're guilty of the exact thing that they flamed you for.
Brilliant.
Re:3 == 1 ?! (Score:2)
Re:3 == 1 ?! (Score:2, Insightful)
Ironically enough you don't say a single thing that isn't true. Everybody responding seems to be overlooking that fact. People are inferring that you are claiming they never get around to the third line in the article. The fact is, it is bad writing even if for different reasons.
The author should have lead with the single line reference and then 'flashed back' to tell of earlier longer exploits, like the three liner(s).
Sorry all 10 or so of you, but the jokes on you! 8^} Don't feel so bad. Even the "professionals" can't write well anymore, so it's no great surprise that you can't recognize bad writing when you see it. After all, if you read the paper or watch/listen to TV news then bad writing is pretty much the norm, and so your conditioned to find bad reporting to be quite satisfactory. It's too bad really.
Re:ON Topic (Score:2)
What about Linux? (Score:2)
Re:What about Linux? (Score:2)
Most Linux servers will probably have very differently compiled kernels to add support for specific hardware and networking protocols (and related things) while excluding such things as all the funky video, sound, and other things you'd want in a desktop. Of course a decent part of this can also be done with modules... It should be obvious too that the actual software running and installed on a desktop will be completely different than on a server.
If I wanted to turn my desktop machine into an efficient and secure (it's currently behind a firewall) server, it would probably take me the better part of a day installing and uninstalling software, and changing configuration settings all over the place.
Re:I got that too (Score:2)
Re:I got that too (Score:2)