Thursday, November 29, 2012

In whose interest . . . . .?

Reproduced here in its entirety for your permanent information:  from WIRED, a "hacker" tells all about how unsecure your systems really are and Computational Ethics . . . . .
----------------------------------------------------------------------------------------------------------------------

Editor’s Note: The author of this opinion piece, aka “weev,” was found guilty last week of computer intrusion for obtaining the unprotected e-mail addresses of more than 100,000 iPad owners from AT&T’s website, and passing them to a journalist. His sentencing is set for February 25, 2013.
Right now there’s a hacker out there somewhere producing a zero-day attack. When he’s done, his “exploit” will enable whatever parties possess it to access thousands — even millions — of computer systems.
But the critical moment isn’t production — it’s distribution. What will the hacker do with his exploit? Here’s what could happen next:
The hacker decides to sell it to a third party. The hacker could sell the exploit to unscrupulous information-security vendors running a protection racket, offering their product as the “protection.” Or the hacker could sell the exploit to repressive governments who can use it to spy on activists protesting their authority. (It’s not unheard of for governments, including that of the U.S., to use exploits to gather both foreign and domestic intelligence.) 

Andrew Auernheimer
An internet troll convicted of two consecutive computer crime felonies, Andrew ‘weev’ Auernheimer has over a decade of C, asm, Perl, and obnoxious IRC curmudgeonry under his belt. He is a liberty advocate and future federal prisoner of America.

The hacker notifies the vendor, who may — or may not — patch. The vendor may patch mission-critical customers (read: those paying more money) before other users. Or, the vendor may decide not to release a patch because a cost/benefit analysis conducted by an in-house MBA determines that it’s cheaper to simply do … nothing. 
The vendor patches, but pickup is slow. It’s not uncommon for large customers to do their own extensive testing — often breaking software features that couldn’t have been anticipated by the vendor — before deploying improved patches to their employees. All of this means that vendor patches can be left undeployed for months (or even years) for the vast majority of users. 
The vendor creates an armored executable with anti-forensic methods to prevent reverse engineering. This is the right way to deploy a patch. It’s also manpower-intensive, which means it rarely happens. So discovering vulnerabilities is as easy as popping the old and new executable into an IDA Pro debugger with BinDiff to compare what’s changed in the disassembled code. Like I said: easy.
Basically, exploiting the vast unpatched masses is an easy game for attackers. Everyone has their own interests to protect, and they aren’t always the best interests of users.

Things Aren’t So Black and White

Vendors are motivated to protect their profits and their shareholders’ interests over everything else. Governments are motivated to value their own security interests over the individual rights of their citizens, let alone those of other nations. And for many information security players, it’s far more lucrative to sell incrementally improved treatments of a disease’s symptoms than it is to sell the cure.
Clearly, not all the players will act ethically, or capably. To top it all off, the original hacker rarely gets paid for his or her highly skilled application of a unique scientific discipline towards improving a vendor’s software and ultimately protecting users.
So who should you tell? The answer: nobody at all.
White hats are the hackers who decide to disclose: to the vendor or to the public. Yet the so-called whitehats of the world have been playing a role in distributing digital arms through their disclosures.
Researcher Dan Guido reverse-engineered all the major malware toolkits used for mass exploitation (such as Zeus, SpyEye, Clampi, and others). His findings about the sources of exploits, as reported through the Exploit Intelligence Project, are compelling:
The so-called whitehats of the world have been playing a role in distributing digital arms.
  • None of the exploits used for mass exploitation were developed by malware authors.
  • Instead, all of the exploits came from “Advanced Persistent Threats” (an industry term for nation states) or from whitehat disclosures.
  • Whitehat disclosures accounted for 100 percent of the logic flaws used for exploitation.
Criminals actually “prefer whitehat code,” according to Guido, because it works far more reliably than code provided from underground sources. Many malware authors actually lack the sophistication to alter even existing exploits to increase their effectiveness.

Navigating the Gray

A few farsighted hackers of the EFnet-based computer underground saw this morally conflicted security quagmire coming 14 years ago. Uninterested in acquiring personal wealth, they gave birth to the computational ethics movement known as Anti Security or “antisec.”
Antisec hackers focused on exploit development as an intellectual, almost spiritual discipline. Antisec wasn’t — isn’t — a “group” so much as a philosophy with a single core position:
An exploit is a powerful weapon that should only be disclosed to an individual whom you know (through personal experience) will act in the interest of social justice.
After all, dropping an exploit to unethical entities makes you a party to their crimes: It’s no different than giving a rifle to a man you know is going to shoot someone.
Dropping an exploit to unethical entities makes you a party to their crimes.
Though the movement is over a decade old, the term “antisec” has recently come back into the news. But now, I believe that state-sanctioned criminal acts are being branded as antisec. For example: Lulzsec’s Sabu was first arrested last year on June 7, and his criminal actions were labeled “antisec” on June 20, which means everything Sabu did under this banner was done with the full knowledge and possible condonement of the FBI. (This included the public disclosure of tables of authentication data that compromised the identities of possibly millions of private individuals.)
This version of antisec has nothing in common with the principles behind the antisec movement I’m talking about.
But the children entrapped into criminal activity — the hackers who made the morally bankrupt decision of selling exploits to governments — are beginning to publicly defend their egregious sins. This is where antisec provides a useful cultural framework, and guiding philosophy, for addressing the gray areas of hacking. For example, a core function of antisec was making it unfashionable for young hackers to cultivate a relationship with the military-industrial complex.
The only ethical place to take your zero-day is to someone who will use it in the interests of social justice.
Clearly, software exploitation brings society human rights abuses and privacy violations. And clearly, we need to do something about it. Yet I don’t believe in legislative controls on the development and sale of exploits. Those who sell exploits should not be barred from their free trade — but they should be reviled.
In an age of rampant cyber espionage and crackdowns on dissidents, the only ethical place to take your zero-day is to someone who will use it in the interests of social justice. And that’s not the vendor, the governments, or the corporations — it’s the individuals.
In a few cases, that individual might be a journalist who can facilitate the public shaming of a web application operator. However, in many cases the harm of disclosure to the un-patched masses (and the loss of the exploit’s potential as a tool against oppressive governments) greatly outweighs any benefit that comes from shaming vendors. In these cases, the antisec philosophy shines as morally superior and you shouldn’t disclose to anyone.
So it’s time for antisec to come back into the public dialogue about the ethics of disclosing hacks. This is the only way we can arm the good guys — whoever you think they are — for a change.

Friday, November 16, 2012

Simfoods

Have you been into a supermarket lately? Once upon a time, stores that sold food sold - well, actual food, you know : fruit, grains, veges, dairy and so on - REAL food. Now there are whole aisles in the local "supermarket" devoted to fizzy sugarwater "drinks",  "snackfoods" "breakfast cereals" and lollies. The real food component of people's diets has decreased and it's showing in their wastelines and the hospital waiting lists.  . . but nothing is being done about it - because it is generally assumed to be one's own fault, right ?  . . . .
As if that was not bad enough, now real foods are being stealthily replaced by food simulants.

Up until recently I ate a pot of fruit flavoured yoghurt for morning tea at work - then they just stopped making them in small sizes. No reason given, of course - so I went looking for a replacement, and discovered that there are a whole range of sim-yoghurts that proudly claim themselves "98% fat free": this is presented as some advantage, but the horrible truth is that this stuff is not even yoghurt any more. It's hiding in the fine print on the containers, so that you won't read it but there it is: the cheap way to get 98 percent fat free "dairy" product is to make it without milkfat, so they add plant based gums that form a sort of gel with water that resembles the milkfat in the goop. 

I am guessing here but the milkfat must be either very valuable or hard to get because there ain't none of it in these new "dairy" products - but I WANT the milkfat.
EATING FAT DOES NOT MAKE YOU FAT. nope.
 It is important to your diet to get enough complex fats though, and  this synthetic goop is supposedly great to make you "take a dump" and lose weight - ( I know, I work with "diet" products sometimes and I looked up what the ingredients do) but not for those of us who are NOT overweight or on a "diet". 

Of course, all the above assumes that the label is accurate and correct.  I wouldn't count on it: what we are really looking at is Bu*****t from the marketing department designed to cash in on people's fear of getting fat.

Well, I found another way to get my morning tea, but the issue is only getting crazier every year: I'm guessing again, but I suspect that artificial goo like Arabica bean gum and it's gummy ilk are a whole lot cheaper than real food ingredients so we will see more and more of it pre-processed "food" in future.

There is also a whole boatload of justification for Corporations to take this route since they only need point to statistics and say "63 % of Australians are overweight or obese, so we are helping them to lose weight" - which in itself is debatable, but they have more political power than me.
 
I just call them all Food Simulants, or Simfood for short.
Stick with real foods folks - veges, cereals and grains, fruit and maybe even real cheese if you can find it among the simcheeses. 
 . . . . . . . . and I'm not even going to mention sugar. That's even worse.

Monday, November 12, 2012

Bitcoin

In the second half of this video, Max Keiser talks about Bitcoin: this may be the way of money in the future - but don't take my word for it, watch the show.

Saturday, October 20, 2012

The Engineer's Tears

When I was a youngster I wanted to make model airplanes that actually flew. I learned from JP, big brother of a schoolfriend, how to design and build a basic airframe that would get off the ground and fly level.
It's not that hard, folks.
If you are flying faster, the rules are slightly different e.g. wing profiles for supersonic aircraft are different and the need for a smooth aerodynamic form is much more pronounced.

Anyone who takes an interest in flying things can pick up a lot of it from looking at the plentiful working examples - so why are fictional aircraft always done by people who ignore all the rules?

Here's a few examples from the DAZ site that make me throw up my hands in horror:

This baby even has a tank turret on top: weird, but take a look at the front profile of it. This thing (if it flies at all) is gonna be very slow. I'm also puzzled by the extra engines above the body that don't seem to be working. Oh wait - if they were turned on they would burn off the tailplane ! 













This one doesn't seem to have enough wing area to get off  the deck. 'nuff said.














This attempts to be the airborn equivalent of the jetski.  Ignoring the wing area issue for a moment, there is just one slight problem with that: the flyer is exposed to turbulent winds.  Provided you were flying at biplane-type speeds that could be okay - but then you would need much, much bigger wings.  Now ask yourself how the pilot is going to control this thing while standing up, buffeted by 100 mph-plus winds and no rudder pedals.
 I hope he has very strong arms !

 Ah,  I say- this one actually looks like it has enough wing area to get off  the ground, although the jet exhausts look a bit small for the size of craft.  Oh - hang on, where are all the control surfaces? where is the elevators - or any pitch control for that matter?
 . . . . . and then I saw another view . . . . .
What should be the main engine air intakes are partly closed off flat !  Add to that the louvres in the wing (so much for enough lifting surface to fly, sigh!) and once again this is just crazy.














Finally . . . . . . .
This is actually the best of the lot IMHO because it does not fall down on any of the foolishness shown above.
Aerodynamic? check.
Possibly enough thrust to get off the ground? check.
Possibly enough control to navigate? check.  (note those exhaust ducts on the tail?)

There's' just a couple of itty bitty problems.
 First, look at the front: the view from the pilot's seat is obscured forward so you won't see what's directly ahead.
Okay, maybe it has a camera and screen so the pilot sits behind armourplate. 

The other one is pretty obscure, so I don't really expect the creator of this flyer to know about it :- the man trouble with VTOL craft using jets is exhaust gas ingestion or EGI for short: when that happens, thrust drops off and the flyer comes down. Everything works fine once you are up in the air, it's those few feet above the runway that are the problem.  The Harrier jump jet uses some clever design to get away from it as much as possible but this design will get EGI in about one second -  that's why we don't have lots of VTOL flyers around using this method.

So in summary I will have to make my own SF flyers and spaceships  if I want them to pass muster.
More work, but at least I can be sure they will look like they might actually fly.
I might even be able to sell them on a website somewhere for pocket money. 

If you are interested, the place to go for some great design ideas for flying machines and spacecraft  (nearly real and real ones, that is !) is Scott Lowther's excellent Aerospace Projects Review Blog.

Wednesday, October 17, 2012

What happenned to the phone

Remember I said my iPhone was misbehaving? I took it to the local "genius" bar where I was told that the dock connector had "liquid damage" and would need to be replaced.
Cost from Apple? 180 bucks.
Well, I ain't made o' money so I decided to try something cheaper: the local  mofo repair guy. He charged 80 bucks and did it in half an hour.

The connector definitely failed: the reason the earphones kept cutting out was that the phone thought there was a dock connection going on.  okay. . . . . but $180 to replace the part?  Even repair guy appears to be getting money for jam - really, how much does the replacement part cost? and labour? I am very certain it did not take half an hour.

So, for anyone else out there, get the best protection for your mofo you can get. I have an Otter  Defender case which is pretty good ( it's about as drop- proof a case as you can get) , but my work is very messy at times and I got slack, leaving it in my uniform  where it got coated in gunk - so I cleaned it: apparently even a wipe with a wet cloth was too much for it.  . . so now I have a plastic bag with one of those airtight seals on it and the phone screen can still be used inside that (although I'm not sure what the sound is like!)



Monday, October 15, 2012

Lytro hits the stores

I have mentioned the Lytro camera once before: it really is not the same as any other "camera" in  that you can adjust the focus and other things after the picture has been taken.

It's now on sale in the US so I hope it turns up here soon too - although probably it will be at a higher price (typically, not for any good reason though).
There is something of great potential here - can't quite say what it will be used for, but I know it will turn up. 

Thursday, October 11, 2012

Spacetrawler

Okay. I don't normally read comics . . . but this one is really, really good. The art is good - but the story is awesome - wish I could write as well as this man, and he draws it too, a page (or two!) each week.
Adventure, wit and great humor all in one comic!
Christopher Baldwin I salute you.


Here's the link to a sample. Below the toon you will find the "start" and "next" buttons.