2013-09-24, 20:47 | Link #2341 | |
NYAAAAHAAANNNNN~
Join Date: Nov 2007
Age: 35
|
Quote:
__________________
|
|
2013-09-25, 07:18 | Link #2343 | |
NYAAAAHAAANNNNN~
Join Date: Nov 2007
Age: 35
|
Quote:
It is fun; but from the exploiter's perspective, it is more of that we enjoy the ecstasy of overcoming limitations, similar to how a loli wearing cuter than normal clothes would get her candy and cuddles.
__________________
|
|
2013-09-25, 09:08 | Link #2346 |
temporary safeguard
Join Date: May 2004
Location: Germany
|
You should look into the concept of 'white hats, black hats' and so on, for hacker ideology.
Generally, CCC are the good guys. They 'hack' things, to expose security flaws, in order to force the manufacturers to fix these now widely known faults. Or so that we normal consumers at least know of the flaws and can do something to protect us from them. The CCC are not the ones that put security flaws in there. That was the fault of the manufacturer. So you should blame the manufacturer for screwing up, not the hacker for exposing the screw up. A lot of people do not understand this however (see SummeryDreams Post for example). It is standard ettiquette to give the manufacturer a warning ahead of time, before going public, so that they can prepare a fix. But of course the manufacturer does not like being exposed in this way. It means more work, bad reputation and so on. So often they will start throwing shit at the hacker in every way possible anyways. If the flaws stay hidden, at some point they will be discovered by the bad guys. Those guys will however not tell anyone about their findings. They will use it to hurt you. |
2013-09-25, 09:16 | Link #2347 | ||
NYAAAAHAAANNNNN~
Join Date: Nov 2007
Age: 35
|
Quote:
Neither does society. To them, there are only black hats. And more often than not, these "judges" are the ones who can't be bothered to fix security flaws even if it has been laid out in front of them; i.e update your server OS, install a firewall, use virus/malware/MSRT scan on a regular basis. The most common question I have heard is "What is the best virus-scan?". My reply is always the same old annoying, "Due diligence". I think any hacker, regardless of skill level, would say that same thing. This is a good read for anyone looking to understand how "hacking" works : Quote:
__________________
|
||
2013-09-25, 12:02 | Link #2348 |
Senior Member
Join Date: Dec 2010
Location: Gensokyo
|
I don't understand a piece of crap about what that man is saying, he is simply trying to justify himself and he pitifully shows that in the end, he is no different than any other wrong doers.
To begin with school isn't only made to teach you fraction, grammar, or biology. It is above all a place to make children understand how society works that's why family teaching is always unadvised. Ponctuality, respect and above all respect of rules, a society can not possibily works if everybody does what he wants on his sides. That was for the societal part, I will skip the educational part, probably the man who wrote this manifesto didn't understand why history was taught in school. Thus he is simply trying to persuade us ( and not convince us, there's a huge difference as the whole thing doesn't have a single sane argument, I need to say it) that hackers are different than common people. No they aren't, they have to follow the same rules and probably because that boy never listened to classes, he can't understand it. Everybody have the skill to enter in the house of somebody, yet only criminals do so. I'm truly sorry, but I see no reason to "thank" them for the job they are doing, it's like saying thanks to your car constructor because he put a security on your thousands dollars engine. |
2013-09-25, 12:05 | Link #2349 | |
Senior Member
Join Date: Jul 2013
|
Quote:
I guess I've read this from the previous article on this thread, or maybe from some. I guess it's really a pain in their pride if some pips had able to infiltrate their security systems. lol
__________________
|
|
2013-09-25, 12:43 | Link #2350 | |
temporary safeguard
Join Date: May 2004
Location: Germany
|
Quote:
But it's a description of this one guys experience and how he got into hacking. It does not say much about hacking itself whatsoever, so the name is a bit misleading. On the other hand, your example about the house is wrong and a typical case I hinted at above, how people don't get it. A hacker of the CCC kind is more like someone coming up to you saying "Hello there, I noticed your house has a cardboard frontdoor. Did you know that cardboard doors are easily broken through with a sharp knife?" Then you, being the typical consumer guy answer "I don't care, why would anyone want to break into my house? There is only my private stuff in there." So then the hacker goes to Cardboarddoors Company and tells them of the security issue in hope they do something about it. Cardboard Company denies any such possibility and kicks the hacker out. So the hacker quickly cuts a hole into their coorporate headquater's front door with his pocket knife, places a notice on the front desk and sends a video of this all to news reporter guy. Cardboad Company learns of this and gets the hacker arrested for sabotage, terrorism, slander, corporate espionage and possession of deadly knify weapons. Meanwhile some other guy, who's not a hacker at all, but a criminal who knows how to handle a knife, has robbed your house of all it's values. You are totally surprised and can not understand how that could have happened. Later you learn of the knife trick on the news from news reporter guy and how a hacker had discovered it first. You blame the hacker for the sad state of your empty house. |
|
2013-09-25, 13:04 | Link #2351 |
Senior Member
Join Date: Dec 2010
Location: Gensokyo
|
We do not possess the same meaning in the word hacker, and that's 100% my fault, for you a hacker is somebody that possessed the skill and knowledge to meddle with informatics, that's the original definition.
For me a hacker is somebody who has the aforementioned skills and use them in a wong way, if he uses it in a good way he doesn't enter in the hacker category anymore, it becomes his job, as such I generally call them ... informatical system protector, or who cares how I call them. If it isn't his job, then he is an outlaw, laws may be wrong, unfair, but they are laws, and as such I do not accept people who can bypass it and above all who tries to justify why they bypass it. As for your story, which is certainly true, or must have derived stories more or less true, I will agree that such facts happened in the past, and continue to happen now in a reduced way, now most societies understood the importance of informatical security and do everything in order to remediate about it. If they do not, they are outlaws (in my country at least) and in case of incident they are the one at fault. I would have been born 25 years ago, where informatical security wasn't as serious as now, I would have certainly agree with you, or any people justifying the actions or "hackers". But not now anymore. |
2013-09-25, 14:08 | Link #2353 | |
I disagree with you all.
Join Date: Dec 2005
|
Quote:
Or hey, how about that time a US private first class stole GBs of government data. That was in 2010. Or, something smaller in scope, like that journalist who got his gmail, twitter, itunes and so on hacked with ridiculous ease. In 2012. But I'm sure now it's all totally secure. Couldn't happen again. |
|
2013-09-25, 14:25 | Link #2354 | |
He Without a Title
Join Date: Feb 2008
Location: The land of tempura
|
Quote:
The hacker ethos, the will to figure out how stuff works and build new stuff is a very important part of the engineering community and I'll be first in line to defend the white hats. As for the black hats, the folks who did stuff like the FLAME virus... Now those are the ones I would be wary off and even more so when they are being employed by western countries information agencies (and most likely all sorts of high level criminal organizations as well).
__________________
|
|
2013-09-25, 15:28 | Link #2355 | ||
Senior Member
Join Date: Dec 2010
Location: Gensokyo
|
Quote:
As you noticed, my answer too, can be brash. If in the case you -who knows- do not understand what my first line mean I will quote myself even if I don't like to do so : Quote:
The debate is too reduced, it goes as white hats = good people, black hats = bad people while it's absolutely untrue, some of them consider themselves as white hats even though they transgress laws. Thus I will say once again my view : all hackers are outlaws the moment they act without the approbation of the "victim" otherwise it becomes their job. I didn't mean they were all wrong doers., simply they do not follow the laws, and I specified that laws can be unfair, and sometimes bad, but there are ways to show your disagreement towards laws. I do not want to see dozens of ninja popping into my garden to check whether my alarms work or not, but I do agree somebody entering my residence if he is properly sent by the society I contracted with. And to make sure Saintess doesn't put a weird picture, I do not accept loli ninja either. |
||
2013-09-25, 16:19 | Link #2356 | |||||
I disagree with you all.
Join Date: Dec 2005
|
Quote:
Quote:
The truth of the matter is that computers today involve a lot more money and data, and a lot more people than it used to. That means a larger talent pool of crooks, more motivated, for they share a much larger pie. That means that information systems have to be idiotproofed for a larger quantity of idiots, who think "password" is a perfectly adequate password. Quote:
Quote:
Quote:
|
|||||
2013-09-25, 16:27 | Link #2357 | ||
Senior Member
Join Date: Dec 2010
Location: Gensokyo
|
Quote:
Actually since I'm tired, I will anticipate your answer and hope I understood well : just where did I say the person sent by the society was breaking the law? If he is under a regulated contract, he isn't breaking it, first off because he has the permission of the society to mess with the alarm, second because the society contacted me to allow them to send somebody to check. I do hope that in the place you live, when they come check the water or electricity, they tell you beforehand and don't make an unforgettable surprise birthday. Quote:
And I will stop there, I don't want to be late tomorrow morning because I needed to spend 20 minutes to write something. Last edited by Zakoo; 2013-09-25 at 16:45. |
||
2013-09-25, 17:05 | Link #2358 | |
I disagree with you all.
Join Date: Dec 2005
|
Quote:
Now, maybe you will hire someone to check, because it is in your interests to know if your door's solid... but realistically speaking, you won't. Because, again, it's expensive. You already spent good money on a premium quality cardboard door, and the fellows who sold it to you looked honest and competent. Professional. Plus, you wouldn't know who to hire. Chances are, you'd just get a guy looking to sell you a paper lock. So the choice is a either a good Samaritan, who may or may not come, announcing to the world the flimsiness of cardboard, and proving it because no one will believe him otherwise, or no one. And by "no one", I mean you'll one day go home to a door with a big hole cut in it. |
|
2013-09-25, 19:12 | Link #2359 | |||
Asuki-tan Kairin ↓
Join Date: Feb 2004
Location: Fürth (GER)
Age: 43
|
Quote:
A hacker can harm a company by simply demonstrating, that their high priced security gimmick x is rather useless. Blaming the hacker for making such exploits public, without harming anyone themselves except debunking the companies false claims of security can still inflict lots of damage, when the knowledge gets into wrong hands. This is why many hackers use CERT or similar authorities to make their findings known. Sometimes however, as in the case of biometrical data as security feature, there are conflicting interests. If country A requires its citizens to have their fingerprints on their identification cards (for whatever reason), the chances are high that it will defend security devices based on the same biometrical data. A CCC spokesperson said: Quote:
Quote:
However, generally speaking, some hackers will use drastic means to gain questionable fame. Some will sell their findings on the black market (zero day vulnerablities can cost 50,000$ and more) only to be misused by people that may or may not be hackers themselves. Whatever the reason, finding weaknesses in software (and exploiting them), can be done in many different ways, by people who have different motives. It is really not possible to generalize them. But I am pretty sure the CCC is more beneficial to a democracy than it is a danger.
__________________
|
|||
2013-09-25, 19:40 | Link #2360 |
Senior Member
Join Date: Sep 2008
Age: 38
|
Both water and electric meters are on the outside of buildings. They do not provide notice that they are checking them. If you mean electricians and the like rather than meter checkers, then you schedule the appointments, they do not make them with you.
|
|
|