Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:chatroulette espionage (Score 1) 194

Yeah, that too! The problem is not capturing the streams because that can be done like you said with screen recording or even webcam recording, the most difficult part is injecting a stream as if it were your webcam and then synchronizing the streams so that when you're "nexted" you immediately find another chatroulette user so it seems transparent to the users being eavesdropped. Anyway, you're absolutely right, chatroulette is not private at all.

Comment chatroulette espionage (Score 5, Interesting) 194

You might not be aware of this but any user can collect IP addresses and record ENTIRE video footage from random chatroulette users. I explained how in my blog http://fernandomagro.com/security/chatroulette-espionage/ . Anyway the concept is really simple because an attacker can open an even number of connections to chatroulette (2,4,6,etc) and then redirect the streams to each other. Say, I open connection1 and connection2 then I capture stream from connection2 and dump it as my primary webcam to connection1 and I capture connection1 and dump it as my secondary webcam to connection2. Only a tiny bit of linux hacking is needed.
The Internet

Time To Take the Internet Seriously 175

santosh maharshi passes along an article on Edge by David Gelernter, the man who (according to the introduction) predicted the Web and first described cloud computing; he's also a Unabomber survivor. Gelernter makes 35 predictions and assertions, some brilliant, some dubious. "6. We know that the Internet creates 'information overload,' a problem with two parts: increasing number of information sources and increasing information flow per source. The first part is harder: it's more difficult to understand five people speaking simultaneously than one person talking fast — especially if you can tell the one person to stop temporarily, or go back and repeat. Integrating multiple information sources is crucial to solving information overload. Blogs and other anthology-sites integrate information from many sources. But we won't be able to solve the overload problem until each Internet user can choose for himself what sources to integrate, and can add to this mix the most important source of all: his own personal information — his email and other messages, reminders and documents of all sorts. To accomplish this, we merely need to turn the whole Cybersphere on its side, so that time instead of space is the main axis. ... 14. The structure called a cyberstream or lifestream is better suited to the Internet than a conventional website because it shows information-in-motion, a rushing flow of fresh information instead of a stagnant pool."
The Courts

Facebook Founder Accused of Hacking Into Rivals' Email 261

An anonymous reader notes a long piece up at BusinessInsider.com accusing Facebook founder Mark Zuckerberg of hacking into the email accounts of rivals and journalists. The CEO of the world's most successful social networking website was accused of at least two breaches of privacy. In a two-year investigation detailing the founding of Facebook, Nicholas Carlson, a senior editor at Silicon Alley Insider, uncovered what he claimed was evidence of the hackings in 2004. "New information uncovered by Silicon Alley Insider suggests that some of the complaints [in a court case ongong since 2007] against Mark Zuckerberg are valid. It also suggests that, on at least one occasion in 2004, Mark used private login data taken from Facebook's servers to break into Facebook members' private email accounts and read their emails — at best, a gross misuse of private information. Lastly, it suggests that Mark hacked into the competing company's systems and changed some user information with the aim of making the site less useful. ... Over the past two years, we have interviewed more than a dozen sources familiar with aspects of this story — including people involved in the founding year of the company. We have also reviewed what we believe to be some relevant IMs and emails from the period. Much of this information has never before been made public. None of it has been confirmed or authenticated by Mark or the company." The single-page view doesn't have its own URL; click on "View as one page" near the bottom.

Slashdot Top Deals

The road to hell is paved with NAND gates. -- J. Gooding

Working...