Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
From User: Decius

"The future masters of technology will have to be lighthearted and intelligent. The machine easily masters the grim and the dumb." -- Marshall McLuhan, 1969

The T-Mobile Election Rigger
Topic: Technology 11:23 pm EDT, May 18, 2003

] Here's the idea: you promise a voter 50 euros (31 pounds)
] to cast their ballot for your candidate, send them into
] the booth with a 3G phone, they send a picture via the
] phone proving that they have voted as instructed and then
] they get the cash.

The T-Mobile Election Rigger


CNN.com - N. Korean training hackers, Seoul says - May. 16, 2003
Topic: Computer Security 6:08 pm EDT, May 16, 2003

] North Korea is training around 100 computer hackers each
] year to boost its cyber-warfare capabilities, pushing the
] South to fortify its own computer security, a South
] Korean military official said on Friday.

The main reason this seems offbase to me is the "100 hackers each year" thing. I have a feeling tracking down 100 computers in North Korea is a hell of a challenge, let alone 100 hax0rs with clue. Not to mention a decent net connection for them to search out tools over, keep up to date on discovered sploits, etc.. The thing that is going to make a cracker a danger isn't a set selection of skills that the other 99 also have, but rather the ability to think on their feet and learn on the fly.. That takes time and experience. I see this situation being very hard to cultivate, as it would require their cracker-corps to be constantally working on their skills, finding new sploits, etc.. It would require access to many of the devices/software they are interested in hacking, which is going to be nearly impossible for them.. I immagine the resources for this all are very slim..

That number also leads to believe that their intent is not to have their hacker-corps working out of North Korea, but rather send them out of the country and have them work elsewhere. North Korea proper would likely be very easy to cut off from the rest of the world in the event of a conflict, rendering their hacker teams useless.. They would have to be stationed in many places outside North Korea to be useful.

Now, if North Korea had crackers spread out all over the globe, working toegether to form some l33t North Korea cracker-corps, this might be logical.. Otherwise, its very unlikely to exist, or be a real danger. Of course, that also implies that North Korea has their shit together, something I don't think is likely. Its more likely that they have 100 people in North Korea who are being called "hackers" and being "trained on hacking", even though most of them have never actually used a real computer for more then 5 min.

This is probably another case of North Korea trying to give the impression to South Korea (and everyone else) it is more dangerous then it actually is.. They have 4 skilled and loyal hax0r kiddies, and somehow it became "100 every year".. Don't they have 300 nukes aimed at the US right now? Heh. Two or three maybe. (And more on the way, but that's another story..)

There is also another option.. North Korea has zero to do with this, and South Korea is just trying too pump up some fear in order to get its people to take computer security more seriously.. Slammer did really take them for a spin. They have reason to be concerned.

CNN.com - N. Korean training hackers, Seoul says - May. 16, 2003


Nmap Hackers: Whoa!
Topic: Movies 10:03 pm EDT, May 15, 2003

] I was sure we'd see a silly "Hackers"-esque 3D animated
] "hacking scene".
] Not so! Trinity is as smart as she is seductive! She
] whips out Nmap (!!!), scans her target, finds 22/tcp open,
] and proceeds with an über ssh technique! I was so surprised,
] I almost jumped out of my seat and did the "r00t dance"
] right there in the theatre!
]
] There can be only one explanation: Carie-Anne has the
] hots for me!

Fyodor wants a screenshot..

Update: And the screnshots are at: http://images.insecure.org/nmap/images/matrix/

Nmap Hackers: Whoa!


NYPOST.COM World News: 9/11 PLOT HIDDEN IN E-PORN By NILES LATHEM
Topic: Computer Security 5:34 pm EDT, May 10, 2003

] Chilling details of al Qaeda's secret communications
] system - and the possibility of widespread knowledge that
] the devastating attacks on New York and Washington were
] in the works - were unveiled in a courtroom in Milan,
] where a group of Islamic militants are on trial for
] supporting al Qaeda's terrorist activities.
]
] According to reports in the Corriere della Sera newspaper
] and on ABC News' Web site, the secret communications were
] discovered during a November 2001 raid on the Via
] Quaranta mosque in Milan, where police confiscated 11
] computers.

] Investigators believe cell members were using a process
] called stenography, in which special software allows a
] text message to be hidden inside a small part of a
] computer photograph.

NYPOST.COM World News: 9/11 PLOT HIDDEN IN E-PORN By NILES LATHEM


Reputation in P2P Anonymity Systems [PDF]
Topic: Technology 11:43 am EDT, May  5, 2003

Decentralized anonymity systems tend to be unreliable, because users must choose paths through the network without knowing the entire state of the network. Reputation systems can improve reliability by predicting the state of the network. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing reputation systems for them while still ensuring anonymity. We find that in each example we first must redesign the underlying anonymity system to support verifiable transactions.

Reputation in P2P Anonymity Systems [PDF]


Hawash Charged With Plotting to Fight U.S. in Afghanistan
Topic: Current Events 5:18 pm EDT, Apr 29, 2003

] An American citizen detained for more than a month as a
] material witness in a terrorism case in Oregon was
] charged today with plotting to fight against American
] soldiers in Afghanistan.
]

] The American, Maher Hawash, a 38-year-old software
] designer in Portland, was accused of conspiring with a
] group of six others who had already been charged with
] trying to provide material support to Al Qaeda and the
] Taliban.

Hawash Charged With Plotting to Fight U.S. in Afghanistan


DID YOU HEAR? . . . (washingtonpost.com)
Topic: Current Events 11:58 am EDT, Apr 23, 2003

] "I looked at it and found the emperor has no
] clothes, and now everyone's mad at me."

The Washington Post gives Billy Hoffman the Quote of the Day.

Link to my posting of the original story:
http://www.memestreams.net/users/rattle/blogid2864198

The full quote:
] "All I wanted to do is tell everyone, 'Hey, this
] is a problem, and it needs to be protected,'"
] Hoffman said. "Everyone was blissfully unaware of
] how it works. I looked at it and found the emperor
] has no clothes, and now everyone's mad at me."

DID YOU HEAR? . . . (washingtonpost.com)


BlackBoard Inc.
Topic: Civil Liberties 5:31 pm EDT, Apr 21, 2003

The statement put up by blackboard about Interz0ne

There is one key point they are missing.. Using the law to silence someone is a very dangerous game. You don't casually sue someone in a mannor that attacks their free speech rights and go on to frame yourself as a good American company looking after your customers.. It doesn't work that way. Once you pull out the legal guns, and use them to attack free speech in any form, our core American values kick in immediately and become focused 100% on taking your ass out. Its the point where you have proven yourself a danger.. Not just to some hacker con, not just to the security community, but to our country and its values as a whole. Really! It is that _big_ if an issue. There is no excuse or way to rationalize attacking free speech that you are going to be able to convince me, or most of this community, is just.

The hacking community (security, open source, etc) is under attack on all fronts right now by the abuse of IP law. As the situation continues to get worse, its safe to assume we will start to respond to attacks such as this much like wounded animals protecting their young.. Unrestrained and vicious. People are starting to lose faith in the legal system's ability to protect our rights from the big pockets who would rather have more control.. This is a bad situation getting worse.

Criminals can work outside the system.. Thats an option for them.. So the people they are truly afraid of will barely be effected. However, the rest of us do not have that option. Destroying the openness of the hacking community will destroy the ability for the hacking community to exist at all.. The basis of the hacking community is the open share of ideas and knowledge.. Thats whats being attacked.. The heart of our community. It will not be allowed to happen.

BlackBoard Inc.


Slashdot | Princeton CS Prof Edward W. Felten (Almost) Live
Topic: Internet Civil Liberties 9:58 pm EDT, Apr 17, 2003

] Geeks will look at proposed network regulation and
] immediately ask "How will this affect interoperability?"
] or "Is this consistent with the end-to-end principle?"
] but non-geeks will look at the same proposal and think of
] different questions. They know what interoperability is,
] but it's just not at the front of their minds.

Slashdot | Princeton CS Prof Edward W. Felten (Almost) Live


Interz0ne: Cease and Desist Letter - 20030411
Topic: Civil Liberties 8:19 pm EDT, Apr 12, 2003

Interz0ne talk censored due to DMCA notice (blogging from the sequestered talk (which is instead a discussion about what occured)).

(Rattle here blogging live from my talk.. There is a reason I have been going around all day chanting "Chilling Effects" in ominous tones..)

Interz0ne: Cease and Desist Letter - 20030411


(Last) Newer << 50 ++ 60 - 61 - 62 - 63 - 64 - 65 - 66 - 67 - 68 ++ 78 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0