Feeds

* Posts by Ladislav

3 posts • joined 30 Jul 2008

Most browsers leave fingerprint that can ID users

Ladislav
Stop

Something is wrong here!

When I visit the page and test my browser it says the following:

Your browser fingerprint appears to be unique among the 978,742 tested so far.

When I do it again, at the same PC using the same browser it says:

Your browser fingerprint appears to be unique among the 978,788 tested so far.

Well if it already identified me the first time, then the second time can not be UNIQUE...right?

0
1

DARPA, Microsoft, Lockheed team up to reinvent TCP/IP

Ladislav

Huh

Leaving the participants in this contract out of my comment (for now) I do not understand the concept behind this excercise.

That is if you a) If you intend to send data over existing WAN infrastructure using new transport protocols (thus replacing TCP/IP) than everything in between requires to understand that protocol. Which defeats the efficiency factor required for military purposes - that is, they may transport using TCP/IP suite that everyone else "speaks" -- or -- something "else" (a replacement of TCP/IP) that everyone else "speaks". Uhm..?

b.) If they intend to use a separate WAN infrastructure (specific for military purposes) than you do not per se require a new transport protocol suite. That is, you can secure the traffic without developing new transport protocols. All in all, TCP/IP remains a very efficient protocol suite.

The only reason I can see that this contract would make sense is: Because TCP/IP is reasonably safe transport protocol suite - that is - it is not trivial exercise to monitor, intercept end relay Internet communications using TCP/IP -- a "new" transport protocol that makes such activities easier (at least for one party -- in this case military) would indeed be handy.

If the reason behind this is increasing transport security (or even increasing of the efficiency) -- you do not require to replace TCP/IP -- of at least conceptually not.

Having said that, from history, at the end of the day it is military who has given us a lot of technological progress and thus knock yourselfs out guys.

Coming back to contract winners - the interesting question is whether they were the only ones bidding....? :)

0
0

Only 'unlawful threats' would invalidate McKinnon extradition

Ladislav

this is fun...

Firstly, those little bit familiar with Network security would agree that more appropriately - the responsible managers at the networks McKinnon hacked into should be charged for due-diligence. I don't know if anyone ever tried this, but I would counter sue the government organizations in question as accomplices to the crime.

If you leave your Mercedes open, with keys in the ignition in South Central, you would probably be a very stupid citizen if you were surprised that it got stolen. If you'd however left your neighbor's car in the same situation, your intentions would _at least_ be questioned.

In either case, car theft (especially if the car is open and has keys in the ignition) is a minor offense. It is more likely that curious kids will steal it and not a professional car thief. (Yes, you can lock up curious kids to a maximum security prison for 10 years - lets see how that will fly).

Whatever the reasons are for leaving of an unlocked expensive car of your neighbor in South Cantral before it got stolen, I am sure that your neighbor will hold you responsible and not the car thief. The neighbor is "US Citizens" and their data (the expensive car) got stolen - because you left it unlocked in an 'easy to steal' manner in the South Central.

For all I know, maybe someone got fed up with his Mercedes and left it there for someone interested.

A reasonably good lawyer can beat this case in the US jury court in a heartbeat. That is - the data of the US citizens are according to the allegations relatively available to access from external networks without intruder being noticed for a good while.

It is near to impossible (or at least extremely difficult) today to exploit a well secured network. I seriously doubt Mr. McKinnon's ability to perform such sophisticated network penetration, giving the simple fact - he got caught. This fact also supports my assumption that security hole(s) he exploited were exploited by luck and not knowledge.

It is a human nature to be curious and provided that Mr. McKinnon is a curious kid and not a professional car thief (I simply assume that such is the case as he also did not profit out the network breach), a slap on the wrist of Mr. McKinnon while firing those responsible for the network security seem rather appropriate.

Secondly, I have read lot about this case, yet I wonder what data have the prosecutors provided to proof that Mr. McKinnon breached the network and what damage he exactly caused. I mean, calling those responsible for network security on the stand could proof hilarious. They have likely breached their own corporate policies and thus allowed this to happen in the first place (hence they are accomplices).

All the fun aside, I must point to the stupidity of Mr. McKinnon as well. If you break the law either make sure you wont get caught, or stop whining after you do - or don't break the law in the first place. No pity from my side, although I do think that your current legal representation is responsible for a big part of the situation you are currently in.

And btw. what the fuck is "the house of lords"? Do you have to kneel once you are granted an audition? Damn, do we live in the 21st century!!!???

0
0