Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Why would he? (Score 1) 167

>Why would Assange wiretap the Icelandic parliament and how could he? I doubt he has that powerful connections up there.

Actually he had an Icelandic person known here in Iceland as Siggi "the hacker" working for him, and he was actually implicated in a hack attempt at the parliment:

"In January 2011, Thordarson was implicated in a bizarre political scandal in which a mysterious "spy computer" laptop was found running unattended in an empty office in the parliament building. "If you did [it], don't tell me," Assange told Thordarson, according to unauthenticated chat logs provided by Thordarson."

From http://www.wired.co.uk/news/archive/2013-06/28/wikileaks-mole

Comment Siggi "the hacker" (Score 1) 167

It is possible this was the work of Siggi "the hacker".
http://www.wired.co.uk/news/archive/2013-06/28/wikileaks-mole
He was fired from Wikileaks after he transferred money from Wikileaks to his personal account. He then contacted FBI and was thought he was to be used as some kind of bait for Wikileaks. He has then been connected to number of other shady deals here in Iceland. I believe he is currently in Prison for a sexual assault.

Comment How this is usually handled in my experience (Score 1) 162

The issue management system usually includes two fields and one check box. One internal text field that includes information about the issue in great detail aimed for the core developers, and another text fields which includes simplified information about the issue targeted for the end user or management, and then a check box which specifies if this issue should be publicly visible. Usually an issue has both fields filled out and the check box checked, but if an issue is set as private it's usually because it concern a security issue, it's a really minor fix or it's a major embarrassment for the company :)

Comment Re:Won't work for the Windows version (Score 1) 104

No you can't just audit the output by starting with 1 line of C code and move up from there, because you don't know what is the actual trigger for the back door. It can be any number of specific lines of code, includes modules or at least some output size of the binary.

It doesn't have to be tiny, you can hide the code in data or other code. But even so just take a look at how tiny some programs are in the demoscene, you can build incredibly small code that does a lot. Also take a lookt at how some viruses are done, some use polymorphic code to hide their signature.

Are really saying that this type of thing can't be done? You have little faith in human intelligence.

Comment Re:Won't work for the Windows version (Score 1) 104

That's a non-trivial hack, how do you propose it "detect specific enryption algorithms in truecrypt" to detect that its compiling truecrypt, and then modify it. How many bytes of code do you think it would take to program that?

You say it like it is complicated. This is just programming, Microsoft and the NSA has billions of dollars to throw at the problem. It doesn't matter how much space it takes it can be done.

Yes it has to be hidden, but you can have self modifying code and you can have code that looks like it does something innocent but actually does something else. Has anybody actually audited the MSVC binary? Didn't think so.

Comment Re:Won't work for the Windows version (Score 1) 104

Of course it isn't something simple like if "solution name" = truecrypt, that is just stupid. It's more like detecting specific encryption algorithms in TrueCrypt and injecting code that makes the encryption weaker by either modifying the encryption slightly or storing maybe part of the key somewhere in the data. So for the right people who know about the back door, decrypting becomes an easy task.

How plausible is that? Well I guess you haven't read about the Ken Thompson hack for the C compiler. Doing something like this is VERY plausible.

Slashdot Top Deals

Arithmetic is being able to count up to twenty without taking off your shoes. -- Mickey Mouse

Working...