Developing Subversive Software? 258
"Examples of the problem are familiar: development of DeCSS brought police to Jon Johansen's home (Interestingly, Jon's two collaborators remain safely anonymous). Distribution of DeCSS brought onerous MPAA litigation down on 2600 and others. Development of CPHack landed Matthew Skala and Eddy Jansson with a suit from Mattel. Distribution of a driver for a barcode reader has put Michael Rothwell under legal duress. Openly defying corporate bullying is important, but grueling. Coding shouldn't always risk martyrdom.
Here are some stray ideas and questions in this vein:
- A program could be introduced to the net via a public access terminal. How common are these? Where are they? Is it easy to upload code? How do you then anonymously publicize your program?
- Code could initially be distributed in encrypted form with its function only loosely described. Lawyers would have no solid target until the key was released, which could happen once that cat was safely out of the bag-- say, after a hundred downloads.
- Do compilers slip information into binaries that could be used to identify the author? For example, do MS compilers sneak a registration number in there somewhere?
- Version 1.0 could include a cryptographic hash of a text message included in version 1.1, version 1.1 could inclue a hash of a message appearing in 1.2, and so on. This would let users know that that a newly posted version was indeed from the original authors, without identifying those authors.
- Gnutella and Freenet are obvious distribution models. But surely RIAA and the MPAA are scrutinizing them for vulnerability to legal bombardment. Will they really hold up? A sort of free-for-all model worked for distributing DeCSS; could that work routinely?
How would you go about developing, distributing, and maintaining 'subversive software'?"
Careful, posters (Score:5)
Ever used a BBS? (Score:4)
Don't the groups that actually put out "warez" still use an elaborate BBS-based scheme before it gets onto the internet in general?
--
IRC File Servers (Score:2)
IRC Would at least be a good "injection" point for the software, then advertising on usenet etc.
Usenet? (Score:2)
usenetserver.com [usenetserver.com] (and i'd imagine most others) for eg doesn't keep logs of who posted what, so any trail back to you is broken there.
Need someone to start a comp.software.persecuted newsgroup for all these types of things.
It would also seem a good way to distribute as it will be mirrored worldwide very quickly after being posted.
First release (Score:2)
CPHack/DeCSS and similar software have problems that revolve around a single issue: there is some sort of secret that needs to be protected/supressed, e.g. decryption code. This sort of functionality can sometimes be factored out, into a plugin of some sort. All the grunt work like a GUI, website, mailing lists, etc can be neutral (e.g. "a program to decrypt arbitrary blocking lists), which couldn't be touched. Then you can release the legally-dubious code by using an anonymous remailer/usenet gateway, in plugin format. Sure, it might be obvious that the same people wrote the plugin, but the laywers can't prove it, assuming you've done a decent job with the remailer.
Re:Ever used a BBS? (Score:5)
What's needed is a way to set up a "front" site and post your code there, without either being traceable to you, and without ever using the same front site twice. That way they can't catch you when you come back, since you don't.
Making us crackers... (Score:4)
Are these "divide and conquer" tactics working? Well, they are altering YOUR methods already. If they didn't work, you wouldn't have to ask your question.
Perhaps this is a question you should take up with the EFF or some other such body. They could use as much help as you can give.
bm :)-~
Re:If you live in the USA, forget it. (Score:2)
Winking in the dark (Score:3)
I would suggest a private, secure newsgroup, hosted on your own machine, to allow only your developers to talk to each other. Think of it as your very own BBS for exchanging information and services. As a matter of fact, a BBS would be a pretty good way to a casual RIAA or MPAA port sniff. So ask your developers to dial into your box direct and keep it off the net.
As far as attracting new developers, this one is a little differant. They can't join a team they don't know exists, so look for trade mags and cheap "alternative newspapers" that have a lot of er umm "escort services" advertising in them. If they can advertise witout getting investigated, so can you. Getting their attention without tipping off "the man" won't be easy. It's a lot like winking in the dark. Sure, you know you're doing it, but does anybody else?
Depends on the road you want to take. (Score:4)
I have taken, and prefer the high road. Hiding, will give the enemy amunition that you are hiding, therefore knowing it's wrong.
If you do something with the belief that you are right, then stand up for what you believe. It's not easy, but large corporations can be fought and you can win. Though some will refer to you as a crackpot.
If you go "underground" anyone who knows, can always surrender your name. You can always submit it to a rogue server from a cash paid public terminal. Use the Gnu or Watcom compiler to make sure that there is no embedded identification code in the executable.
Re:Ever used a BBS? (Score:2)
And how is this front site any different than distributing to some BBS which you chose at random? Anonymity on the Internet is a myth. So many logs are kept of assorted kinds of traffic that I would never dream of doing anything more illicit over the net than grabbing the odd mp3.
--
Fight fire with fire (Score:2)
What exactly are you hiding from? (Score:5)
I'm sure you all think I'm naive, and I'm underestimating the damage that a lawsuit can do, but it strikes me as incredibly cowardly to do otherwise. Personally, I've sent copies of the musical version of DeCSS (a link would be helpful here) to all my friends, so that they can play it on their radio shows. None of them have blinked. Like most "broadcasters" (including authors), they know that because of their position, it is their duty to be the first line of defense against the thought police.
(Aside: Why do all my friends have radio shows? Do hand them out at concerts or something? I want a radio show!)
Developing Free Software (Score:2)
The only method I can think of to avoid having this happen would be to take it underground. It wouldn't be that hard to set up a private, invitation only VPN. Using the web of trust model and the threat of kicking off a node that jepordizes the rest of the network (By allowing an untrusted leaf to connect through it) we could implement a net away from the common man and the corporate fiends. One pretty much unknown to them. One where we could post program foo without having to worry about getting a phone call from some corporate lawyer the next day, or a week or a month later.
Move coding out of the USA (Score:2)
Do not use any American coders in your open-source project. You heard right, no American coders. Although this might be a bit extreme, it is necessary to prove to the government and to corporations that they are killing the American IT industry. (By American I mean the United States, not Canada or any other country in North America)
If this does not make the companies get the message, then it's their own fault for killing the economy.
Usenet? Definitely. (Score:2)
The advantage is that if it was posted to alt.code.subversive.source from, say, Malaysia, it'd probably propogate to The Rest Of The World(tm) before reaching the US...at which point, it'd be too late for a quick-and-dirty yank of the original posting.
What you might also consider is making an announcement somewhere about how/where/when it'll be posted -- a pointer in the C sense of the word. "Look for subert.tar.gz in Base64 after the 15th of every month." The announcement could be made in any number of places besides just the newsgroup -- what if we all know that my user info on Slashdot can be checked for when v1.2 is coming out? And let's not forget the Real World. A classified ad in The New York Times would be an effective and fairly international way of announcing such a thing.
TAZ rewebbers (Score:2)
The dangers of asking such questions (Score:2)
At the same time, I'm glad we can still have this sort of discussion. I'm scared to think that the threat of net censorship could make things like this nonexistant, and I'm thankful that slashdot can cover this sort of material.
I realize that this is an "Ask Slashdot," and not actually material by the people who run slashdot. So what. Slashdot is run by CmdrTaco and company, but a very large portion of it is defined by the slashdot community.
In a nutshell, I think everyone should be thankful that we can still ask questions like this.
Cheers.
Hah! (Score:3)
Re:anonymous maintenance (Score:3)
Suppose I want to write a program that I know corporate America won't like without being sued or arrested.
You can send a synopsis of your proposed code and ask specific queries regarding its implementation at the folling email aliases (obfuscated to protect the innocent):
postmaster@[32.96.111.130]
webmaster@[208.47.125.33]
jv@[209.67.152.159]
root@[208.225.90.120]
Speaking of helping the EFF ... (Score:3)
Obfuscate your identity (Score:4)
Anyone with enough resources will be able to track you down. Big corps usually have good private investigators on the payroll - these guys don't have to play by the rules like the cops/feds do. You can take some steps to make things considerably more difficult, however.
Use a *good* anonymous remailer [publius.net] in a country other than your own. If possible, use several remailers in several different countries. Distribute your software through Freenet [sourceforge.net] and encourage users to set up mirrors. Use encryption software, such as GNUPG [gnupg.org].
These suggestions are perfectly legal ways to obfuscate your identity. This is good because if you are caught, there won't be a lot of "enhancement" charges thrown at you (like getting caught with a few grams of pot, a small scale, and a (legal) gun). Depending on exactly how "subversive" this software is, you may decide it's worth breaking a few more laws to reduce your chances of getting caught.
Use a non-digital distribution model (Score:2)
If you are real ambitious you could hide the code into a picture [kuro5hin.org]. Then if you could get this picture into a highly distributed magazine then everyone would have the code and all they'd have to do is scan it and run it through a program to decode it. This picture method would also work if you want to still use the internet to distrubute it, atleast it would help a bit.
I would think if many people have the code before it is posted to the internet it would prove very difficult to prove who's code it is, and they would have to sue every single person who put it up which would take quite some time if they'd even bother.
You're Confusing Your Objectives... (Score:4)
Hi!
I think you have to decide what you want to do:
If you want to run an Open Source project, hey, that's great. But by its very nature Open Source is open--the very opposite of clandestine. If you're going to write clandestine software you need to maintain an absolutely closed development group--you simply cannot tell the world the names and addresses of all the members in your cadre of 3l33t haX0r d00dz.
Corporations? You're Aiming Too Low
DeCSS may scare the (few remaining) wits out of the MPAA--but ultimately the MPAA is just a trade organization dedicated to staging an awards ceremony. If you really want to have a little excitement, consider doing something really subversive. Say, develop Arabic-language courseware targeted at girls (particularly Afghan girls). Or Bible-club software in modernized Chinese.
I have been involved, in years past, with an ad hoc operation that smuggled Bibles and other Christian books into countries where they were (and in several cases still are) considered contraband. The operation was relatively small--because we had limited funds, and because we depended upon people in-country to handle distribution. Our funds were limited by our need for security--if we'd broadcast to the world that we were smuggling Bibles to women in the Persian Gulf the locals might have caught on. Or worse, caught our contact in-country. Security is paramount.
That said, yes--Microsoft compilers do point to unique identifiers in things like class IDs. A necessary part of the COM interface requires a globally-unique identifier--that identifier of necessity points to your machine. That doesn't make it easy to find your machine--it only means that once the authorities get to your door they can prove that a particular class or DLL was originally compiled there. (That is, it was compiled there first--subsequent compiles on other machines won't change the class IDs, so those later builds will still point to your machine.)
I cannot resist!!!! (Score:3)
You said, "free country"
DO YOU MEAN free-as-in-BEER COUNTRY,
OR Free COUNTRY!
Free countries must use the Gnu Public Constitution(tm), or they're not really Free, merely free!
{grin}
WWJD -- What Would Jimi Do?
Some sort of physically hidden server? (Score:2)
So a little gedankexperiment: You take to work a little palmtop something or other -- actually, this would be a perfect task for a Tiqit computer [tiqit.com] -- hook up a small hard drive (hell, you get 10 meg drives free at Burger King these days), hook it up to the ethernet at work, and stuff it behind some drywall. Voila, instant hidden server. (Best Ron Popeil voice: "Just set it...and...forget it!") You access it from public terminals/net cafes, following the usual precaustions (stay away from where you live, pay cash, don't use the same place twice), and you don't keep logs on the damn thing.
Before the flames start, IANAY (I Am Not Awake Yet), nor do I know much about networking. Is this sort of thing feasible, or is it just another cool idea that is utterly impractical? Anyone?
Re:First release (Score:2)
possesion of stolen material is still a crime (Score:2)
Look at the ruling in both the CPHack case and the DeCSS case. They are using the "working in active concert" bit to stop linking and mirrors.
The Napster [aclunc.org] is turning around the burden of proof on an infringement case.
Even so, big companies is using the expense of litigation to beat people into submission. That is why Jon settled with Mattel, not being able to afford to defend it. Not the issue of propriety of his acts.
Re:Sweet Skepticism of the Heart (Score:2)
Sweet Skepticism of the Heart --
That knows -- and does not know --
And tosses like a Fleet of Balm --
Affronted by the snow --
Invites and then retards the Truth
Lest Certainty be sere
Compared with the delicious throe
Of transport thrilled with Fear --
-------------
Anonymous Emily Dickinson LIVES!
Jesus Christ, how in the world did this woman manage to anticipate all these slashdot articles so many decades before they were published? +1, Interesting, +1, Ontopic!
Another poetry lover remains,
Gratefully yours, WDK - WKiernan@concentric.net
Or try creating, instead of stealing... (Score:2)
---------
XOR (Score:2)
I wrote a program called Pad [lammah.com] which implements this scheme, if you're interested. I also have a public pad repository [lammah.com], one of many repositories which have links on David's page.
--
Re:Careful, posters (Score:2)
Yeah, a snake-ball of ten million laws and another million new ones expected by the end of the year, and yet "ignorance of the law is no excuse." Obviously the plan is, a fearful proletariat, each individual subject to arbitrary arrest from any direction at any given moment, will be a docile and productive one. Somehow I doubt this is what Thomas Jefferson had in mind.
Yours WDK - WKiernan@concentric.net
Comment removed (Score:3)
candle vesus blow torch. (Score:2)
I caught that Mattel making inconsistant arguments and used it against them. They claimed that they should have an unfettered right to file lawsuits, but they filed (and lost) a lawsuit against someone for filing a lawsuit against them.
"Public Terminals" (Score:2)
Won't work (Score:5)
This way a small BBS will be "decrypted" immediately; FBI just needs to run a query like:
SELECT DISTINCT originating_number
FROM all_phone_calls
WHERE target_phone_number =
against the phone company's data warehouse.
It is so simple (Score:2)
Re:Ever used a BBS? (Score:2)
You are having paranoid fantasies (Score:3)
You seem to have an overly high opinion of the "conformity", if you will, of corporations. There are companies that let you gamble and buy drugs, steal music and videos, and hire prostitutes, all over the web.
What on earth could you be doing thats is worse than this?
I have a funny feeling that you're a minor-league developer who has let the slashdot "black-helicopter" club feed your paranoia.
USENET + Signed PGP (Score:3)
Answer your question?
Re:Subversive Code (Score:3)
* Anonymous distribution of "embarassing" materials. Model here is the "Church" of Scientology's (tm) "copyright trade secret" "scriptures". They have established a precident that, if somebody releases private material showing evidence of a crime, the IP issue of releasing private material takes precident over any crimes that that material might provide evidence for.
* Code that enables small-scale, not- for- profit sharing of things like recordings and movies. Right now, I would *not* want my name associated with an MP3-sharing program.
* Code that enables use of IP things in ways that the "owners" don't approve of. An example would be bypassing the "fast forward cutout" on some DVDs. Yes, fast forwarding through commercials is a "crime" now.
* The way that things are going, "reverse engineering" of any kind will soon be illegal. See the discussions on the "CueCat" and the hoohah about figuring out what CyberSitter et al actually filter out.
Anyway, the way the laws are currently written, any time you do something that a big company doesn't like, they can simply sue you into oblivion. Anonymous software distribution gives you a way of getting your stuff out there without painting a target on yourself.
mail2news anonymous remailing? (Score:2)
Re:What exactly are you hiding from? (Score:2)
I think the request arises from the sense that so much of what we do on the Net is monitored and/or discoverable after the fact, via technical or legal means. Freedoms that we take for granted in the "real" world - the ability to have a private conversation with someone, for example - largely don't exist when we're on the Net.
For those of us whose lives are heavily intertwined with the net, this is rather disturbing, and it's only natural - and important! - to think about how these controls could be circumvented if it became necessary.
The politicians, beaureaucrats and lawyers are busily trying to create a world in which criminals can't function. Unfortunately, at the same time, they're creating a world in which everyone is potentially a criminal (copying a DVD for a friend qualifies now, under the DMCA.) The result has the potential to be quite scary, even for law-abiding citizens.
Re:Usenet? (Score:2)
Then again you'd have to be sure they DO delete the logs, and if someone was really after you they could possibly recover them.
Then again there's quite a few usenet servers out there (including a lot of open ones), should be one that doesn't log.
If I thought someone was seriously after me though I'd think I'd only use this along with a few other links and fire breaks though.
Re:What exactly are you hiding from? (Score:2)
In an ideal world, there shouldn't need to be any reason to hide from the law, and, for the protection of the people, hiding from the law shouldn't be allowed. Of course we don't live in such an ideal world, but that's no excuse to just give up and assume that this can't be changed. Like the Suck.com article pointed out, if we don't work within the system we will be crushed by it.
--
Incorporate (Score:3)
Create a business, file the proper papers, and have the software be created for the company.
Generally, the company can be held liable for the sins of its products, but the employees can't.
This is why MS may be broken up, fined, etc., but Bill Gates won't go to jail.
Any lawyers out to there to clarify or correct?
-----
D. Fischer
Rule #1 (Score:3)
Re:Usenet? Definitely. (Score:2)
Possibly we should start (virtually) hanging out with some of the better crackers and warezers out there, some of them have been going forever without having been caught yet.
Another idea antiquated as it may seem would be to use the post, you write the program, drop a load of copies in the post to people you believe to be sympathetic, they get it, and drop a load of copies in the post to people they know. Pyramid distribution, nobody knows who started it, no one knows who has it...
Grow up (Score:4)
So you want to do some noble "power to the people" project that "corporate America won't like". Well, two things come to mind. One possibility is that you want to create something wonderful, like an extraordinary browser (Mozilla), or a whole operating system (Linux), or any number of other superb products that legitimately compete ferociously with products of "corporate America" like IE, Solaris, Oracle, etc. If that's the case, then the number of ways you could contribute to the world is virtually limitless, and you don't need to sneak around to do it. "Corporate America" calls it "competition", and it goes on above ground, in the light of day.
The other possibility is that instead of creating something of value yourself, you feel an adolescent urge to be a big hero to other adolescents by finding ways of stealing things of value created by others. You have some cartoonish image of "corporate America" as The Evil Empire from Star Wars, and you're some noble code Jedi with a compiler for a light saber. I suspect you're in this camp. I'm mistaken, then these comments apply to those who are, but not to you.
"Corporate America", in reality, isn't one entity, and it isn't even American. It is the majority of working people in the developed world and the relatively consistent conventions they've established for cooperating as groups and individuals to convert the hours of their lives into things of value, which they then trade with other groups and individuals. It is also the relatively consistent conventions they've established to prevent people and groups from stealing from one another, forcing them to have to produce things of value themselves that can be used in voluntary trades. That increases the pot of goods and services rather than just shifting them around.
There are plenty of areas in commerce where reasonable people of good will legitimately disagree on areas of legal policy. There are also countless inequities and inefficiencies in a system that still requires human lawyers to argue the edge cases. Those with the biggest legal budgets tend to win more than their fair share of edge cases.
Unfortunately, there are also a lot of people who think it's their right to steal anything that they can get away with stealing. They frequently point to the inequities of the system as a rationalization for their base desire to simply steal something rather than trading for it.
Instead of pouring your energies into finding ways to steal from your neighbors, whom you refer to as "Corporate America" to make it sound noble, why don't you find a charity that can't afford to pay for "enterprise software" and build something for them from open source components?
Or why don't you find a way to extend the features of some open-source system to cover the needs of a group that doesn't yet have the necessary level of computer literacy to do it for themselves?
Or why don't you go out and create music or great films or whatever, and then give away what you've traded the hours of your life to produce, instead of trying to give away the hours of other peoples' lives?
How to release and maintain code anonymously (Score:5)
1) E-mail
Setup a nym account with one or more of various nym servers out there:
nym.alias.net [mailto]
redneck.gacracker.org [mailto]
OR, you can get a paid for nym account with ZKS:
ZKS Freedom Net [freedom.net] (They are taking applicants to beta test their Linux port now)
This takes care of having an anonymous bi-direction e-mail account that people can contact you through and will be secure from the attacks of a determined foe (be sure to change your reply blocks often though).
2) Publish the code somewhere publicly available, like the web or usenet.
The next problem is distributing your code. What you need is a means to publish the code anonymously.
Web
To contact sites like sourceforge [sourceforge.net] anonymously, which provide you with a nice mechanism for releasing the code and storing it somewhere, you need a web anonymizer or an anonymous routing scheme like ZKS.
Several solutions exist to do this. In order of highest security:
ZKS Freedom Net [freedom.net]
CROWDS [att.com]
Anonymizer [anonymizer.com]
Usenet:
Usenet is means of publishing your code that is even more resistant to censorship attacks than publishing the code on a website:
mail2news gateways. These allow you to post an e-mail message to usenet, preferably after you have anonymized it thru several remailers. Posting to usenet is an EXCELLENT mechanism for getting past the most determined censor. As long as you don't start spamming your distribution, and thereby driving your BI up, you can be pretty sure that your post will not get robo-canceled. If you want to be really fancy, you can encrypt the message, publish the password in another forum, and then post the conventionally encrypted message to aalt.anonymous.messages [alt.anonymous.messages]. This will defeat efforts to automatically find your post on usenet and then issue a third party cancel for it.
Here is a list of known mail2news gateways:
mail2news AT nym.alias.net
mail2news AT zedz.net
mail2news AT mixmaster.shinn.net
Send a message to one of the above e-mail addresses with "help" in the subject for instructions on how to use the gateways.
Python
Re:You are having logical errors (Score:2)
What if there's no money to be had? What if the individual wants to do something that he believes is of social importance but doesn't have a great deal of direct monetary worth?
There are companies that let you gamble and buy drugs, steal music and videos, and hire prostitutes, all over the web. What on earth could you be doing thats is worse than this?
There aren't any corporations selling DeCSS, though - why is that?
Just because some corporations do subversive things, doesn't mean that there aren't any problems with developing subversive things, and it doesn't mean that individuals shouldn't consider the problems they might encounter doing something like that.
Re:unique identifiers [OT] (Score:3)
Re:anonymous maintenance (Score:3)
College computing sites are perfect for this. Do not put your dev machine on the net; instead deliver it via read-only media to the site, and get access (for example, sniff passwords w/out doing anything malicious to the user; the more actions you take against the user, the more you expose yourself). Send the information (sourcecode, binaries, etc) via many different routes, almost all of which are irrelevant.
By the same token, if you know how to hack, make automated scripts that send information in a similar manner, to the same routes. Only one person need know how to compromise such machines; that can be your logistics person. No gratuitous damage there, either.
College areas are unlikely to have any sort of visual surveillance. And of course you will keep in mind that it is not impossible.
I am demonstrating much of this at the moment.
stealing is not the point (Score:4)
I think the balance of power is seriously shifted in favor of corporations. It's not just a question of "stealing" copyrighted material, it's also about the customer's right to use that material in reasonable ways. Even though I don't agree with the use of Napster to perform large-scale free distribution of copyrighted work, I think things like Napster and DeCSS are important in order to reach some kind of acceptable balance on these issues, and ultimately to declaw UCITA, DMCA et al.
Re:Incorporate (Score:2)
Re:Or try creating, instead of stealing... (Score:2)
Also known as... (Score:2)
Oh wait, you can already get in trouble for that...
Re:Usenet? (Score:2)
I have an account with them from when my ISP didn't have newsgroup access (barbaric or what?, but hey they gave me unmetered calls)
There is some info on anonymous usenet posting at http://www.geocities.com/Capi tolHill/1236/howto2.html [geocities.com], also a lot of info [google.com] if you search on google.
Actually I guess if nothing else this is probably going to end the old hacker (coder) / hacker (system breaker) argument as we're all going to have to be both the way things are going...
This is a toughie, for sure. (Score:5)
My own answer has been along these lines- I will create to the best of my ability and use the legal system to defend the interests of the people I'm creating for. That's sometimes meant GPLing software, when I could- my software is frankly not world-class, it's not really my area of expertise- and now it's beginning to mean that I must put together not only my recording studio, but also CD mastering and duplication, and even hosting for free audio. The studio's done and quite functional- CD mastering and even Video CD mastering is dead simple- duplication's going to cost me some serious money, I'll be taking out a bank loan when I have my ADAT paid off to get a duplicator- and hosting is beyond _my_ reach though I need it desperately.
All this is needed because I can't trust the commercial sector to handle it for me. The breakdown goes like this:
Basically, I see a pressing need for just plain media hosting on a massive scale. It could well be restricted to mp3 and ogg vorbis (hell, include wma). It could also be restricted to 128K on two assumptions: one, it'll be important to not have everyone doing 320K and using up two and a half times the resources for their stuff, and two, it's low enough quality to justify being giveaway stuff and high enough to basically enjoy. It will not pay musicians one cent for the downloads- on the other hand it will not _charge_ musicians a cent for the hosting. Most importantly, it will have a usage agreement that protects both parties, asks only nonexclusive rights to host the material, claims no copyrights to the material, and requires any contract changes to be explicitly signed off on by the artist. (This last one is the main thing mp3.com just lost in their contract alteration).
Instead of instantly planning to fund the thing off ad banners (aren't we all sick of that by now?) I propose the hosting service be incorporated... as a 501c3 nonprofit corporation. This is a VERY IMPORTANT point for protecting artist rights in the current climate. The 501c3 must have an explicitly spelled out mission statement that it must abide by to maintain its nonprofit status. It can seek grants- it could even solicit money from the RIAA labels, 'leeching' off them to provide its services in perfect safety. It can pay server operators a relatively decent salary for doing their jobs- you wouldn't have to go hunting for MCSEs, you could spec out a proper high-load server farm and pay to have it run properly, nonprofit doesn't mean it can't pay employees a normal wage. Finally and most importantly, a 501c3 answers to the IRS and has to follow certain rules or cease to exist. It CANNOT be bought out, either in a takeover or a merger, by a commercial corporation. It can only be bought/merged with another 501c3- and for this to happen both 501c3s must have essentially (literally?) the SAME mission statement, not differing ones- and it is so hard to change a 501c3's mission statement that you might as well disband it and start a new one. And when you disband a 501c3, all assets it has must be distributed to OTHER 501c3s covering the same basic area.
When you look closely at these things (I have a friend who is expert at framing charters for 501c3s and knows all about them and has a terrific batting average for his 501c3 proposals being approved), it's amazing- almost GPL-like- it's a form of legal incorporation that uses the meanest parts of the US government (the IRS!) to protect you against rampant corporate abuses. If you are a 501c3 no commercial corporation can touch you- they can give you money for a tax break, and that's about it. They can't buy you out. They can't shut you down- even if they for some reason got totally Mafialike and pressured all your boardmembers to disband the corporation, your resources simply get distributed to other 501c3s doing the SAME JOB. It's like the liquid metal Terminator- no amount of force can destroy you! All watched over by the IRS with gimlet eyes. You don't have to vigilantly guard against, say, major labels subverting you and making you a profit-earning subsidary. The IRS will vigilantly guard against that :)
I'm not sure what the software sphere would need in terms of a 501c3 to develop ideas that need to remain free of corporate control. I do know the needs of my own sphere- music, media in general, video as that becomes a factor. The music sphere needs free hosting because a musician who's even slightly prolific will rapidly exceed the bounds of any personal site or typical hosting service, and it seems like most/all of the music/mp3 hosting services on the net are RIAA label controlled or copying their contractual provisions.
In order for musicians to be able to function outside the confines of RIAA ownership, they need to have the ability to own the means of production (easy: CD burners and duplicators and Internet sales) and the ability to circulate music to people who don't know the music yet. It really isn't necessary to have one recognizable site for people to _browse_ from (mp3.com is full of bands who've never been listened to- I always got most listens from mentioning what I do on Slashdot), but it is necessary to have a site with acceptable policies/contracts which won't need to be changed or moved. Wherever it is, there needs to be a fair amount of stability so that the musician can distribute CDs, posters, handouts with the URL on it. Because of mp3.com's change of contract, I have posters, CDs out there, even 24 cassette tapes that haven't even been _recorded_ yet, all with the mp3.com addy on them, which is now obsolete.
The common factor here is that it's all about giving _my_ material a base of operations that's not easily destroyable by corporate interests. I'm not attempting to, say, sample RIAA label acts and use their music as part of my composition. I am not negativland ;)
A very good question would be, how important is it to pursue development on IP that corporations have claimed as their own, and how important is it to defend IP that is actually original? Most of my response has been centered on defending the ability to produce and distribute stuff (music, video) that is original, knowing that the _facilities_ for this production and distribution are under continuous attack, but my right to produce is not actually in question.
Are programmers in danger of losing their right to produce, or is the perceived threat simply that anything programmers do will be patented by corporations and taken away from them? There is a point at which this begins to seem unreasonable. Somebody at Amazon _thought_ they invented one-click ordering, which is stupid but doesn't necessarily mean Amazon set out to 'steal' stuff from the public domain. I question the wisdom of assuming, from the start, that what YOU CREATE is so doomed that it must be 'subversive' to survive. I would suggest trying to remain visible and CREATING stuff, quite openly. Use contractual tools like the GPL to protect your interests. Don't assume you're so outclassed that you must go into hiding! We're looking at an era of much legal rule-changing. Some of the rules are changing to heavily favor corporations and piracy, by them, of intellectual property and other types of property and privileges. Some of these rules will be changed BACK once the consequences are clear. Act as if the world was fair and you had rights! Behave in good faith and don't knuckle under to the appearance of oppression. Act AS IF you had rights, know what they would be if you had them. Don't act like you are a criminal just because some other entity profits by criminalising you.
The last word is this- when you create, you set the rules. My CDs will have "All commercial rights reserved- noncommercial copying OKAY" at the bottom of every single one of them. If the RIAA manages to make (for instance) copying of tracks off audio CDs automatically illegal, I will happily participate in a test case: someone can rip my stuff and put it on Napster, and I will testify that I explicitly allow such noncommercial copying of MY CDs, thus no blanket rule can be made. The RIAA DOES NOT HAVE THE RIGHT to set MY rules, and my rules for my CDs permit noncommercial copying. I'm even spelling it out on the CD itself where it can't be missed- my wishes _will_ be respected. That's justice.
The road you take depends on other things too. (Score:2)
The outrageous distortions and outright lies used to demonize software such as DeCSS, combined with the sledgehammer tactics against the people who dared distribute it or merely talk about it, proves that the system is grossly broken. There are people who want to go around it until and unless it is fixed. Anonymity is a good way to do that, and I fully support them.
--
Too vulnerable to duress. (Score:2)
It sucks, I know. But this is the way it is at the moment, and the way it will continue to be until the public gets outraged by something and DEMANDS that the corporations admit that people have rights and leave them alone. What could do that? I dunno, how about a utility to store DVD's on a hard drive so that kids can play "The Lion King" whenever they want without trashing the expensive disk? How many parents would just LOVE that? How much sympathy would there be for the MPAA and Disney if they went after the people who gave it to the public? That's the kind of thing to go for.
--
Re:Ever used a BBS? (Score:2)
My
Quux26
Re:anonymous maintenance (Score:3)
Unfortunately, this doesn't appear to work either. The U.S. gov't has just successfully prosecuted an American citizen for running an internet gambling site based in Antigua (he himself was in Antigua too, at the time of the 'violation', and the site is legal in Antigua). His crime seems to be that he is an American and was allowing Americans to access his site. So, it appears that doing something that is legal in the place where you are and is theoretically outside of U.S. jurisdiction is not necessarily a defense, if you're a U.S. citizen.
Re:You are having logical errors (Score:2)
Then beyond threatening someone with violence, this individual should have no problem posting his/her thoughts on the web in the US.
Hell, if NAMBLA can have a PO box, anyone can.
There aren't any corporations selling DeCSS, though - why is that?
Uh, maybe because its free?
Not true (Score:2)
Not true. If carefully used, modern tools like Zeroknowledge System Freedom can make it impossible to trace items back to you. All transactions are strongly encrypted, no records are kept, and the traffic can be made to pass through 3 servers in different political jurisdictions. If one used a particular ZKS nym just a few times, the likelihood of discovery of one's true identity is effectively nil.
Re: (Score:2)
Re:stealing is not the point (Score:2)
We don't have the proper tool yet. The RIAA, MPAA will give us the proper tool in time- that tool would be further legislation that is so completely intolerable that it produces a backlash and calls the whole show into question. For instance, retroactively making all CDs owned by the record company so everyone's existing collection becomes 'leased' not owned- or outlawing all forms of media exchange, or outlawing all ripping of audio CDs. These steps are probably inevitable but they are crucial- they would plainly reveal the true situation, that media in general is very close to being a 'closed shop', like a sort of government only you can't vote for how it's run.
The key factor is that it can't simply affect what people do with RIAA property (such as the music content of CDs ripped to mp3): it has to begin to affect people's personal property (I don't own my CDs now? But they're _my_ CDs!) or their rights over their property (I'm not allowed to mp3 my song? But it's _my_ song, recorded it myself!).
Only then will the problems be clear enough to see justice done. As long as it's about copying Britney Spears CDs without her permission it's a losing argument. But it _will_ escalate until the problems are so terrible that there's no more ground to give.
Don't use a CD Burner (Score:2)
Re:IRC File Servers (Score:3)
Re:Careful, posters (Score:2)
Seriously, this was my first thought: Would active participation in this thread constitute conspiracy? Could it be actionable to give good advice here?
Re:stealing is not the point (Score:3)
Nevertheless, I see an element of civil disobedience amongst Napster users that goes beyond just the desire for "free stuff". Some see cheap justifications and rationalizations; I see at least some people who aren't necessarily articulating what's bothering them very well, or in the right places (mea culpa), but their actions speak for them. Mindlessly criminalizing this kind of activity won't ultimately help even those lobbying for the criminalization, as we both know.
[...]or their rights over their property (I'm not allowed to mp3 my song? But it's _my_ song, recorded it myself!).
I agree, this is one of the big danger areas. Actually, as copyright holder of your own work, you'll probably be allowed in theory to mp3 or dvd it, but getting access to the necessary tools could be another question. In the current climate, it's easy to envisage being forced to join the RIAA, pay dues, and use an approved publishing company, all to gain access to the technology required to create content that can be recognized by consumer players.
As long as it's about copying Britney Spears CDs without her permission it's a losing argument. But it _will_ escalate until the problems are so terrible that there's no more ground to give.
Agreed on both counts.
One ray of hope I see is that higher courts in the U.S., especially the Supreme Court, are often pretty good at handling this kind of thing. As long as the next president doesn't totally mess up the court, I fully expect some of these things (like code that's illegal?!) not to hold up.
Speaking of which, to bring this back to the original topic, now that particular bits of code have been declared illegal, I consider it virtually a moral duty to try to write such "subversive" code - otherwise, we are capitulating to an unacceptable restriction on freedom of thought, expression, and communication. I haven't thought of a suitable application yet, though, so the NSA and RIAA can sleep easy for another night! ;^)
Sure it'll piss off you AOL users (Score:2)
Re:Careful, posters (Score:3)
Re:Some sort of physically hidden server? (Score:2)
It wouldn't even take a traceroute. Having just spent the day recabling my office, it's surprising how easy it is to spot where things are drawing power just by watching the electricity meters, following the cabling, and wondering what the hell this is that's plugged in right where I want to put this printer box.
Add to that that most HDDs are noisy wee bastards, and that behind a dryline is a very dusty environment, and you've a recipe for a very grindy HDD that wouldn't last long at all.
And if it wasn't the dust, it'd be the moisture.
Pick your country (Score:2)
It's... It's...
Re:You are having logical errors (Score:2)
One of us must be missing something here. If I write some code which is considered equally threatening to commercial interests as DeCSS, by posting it on my website, I risk prosecution and legal sanctions, assuming my code falls foul of the DMCA, UCITA, etc., which is not that difficult.
This might all be more acceptable if the function of the code in question were somehow inherently against the interests of society. However, I don't see that as being the case here. For further arguments along these lines, see this message [slashdot.org] and my reply to it.
Hell, if NAMBLA can have a PO box, anyone can.
Part of the point is that online, some of the freedoms that exist in the "real" world are disappearing. You may think that would be good, in the case of something like NAMBLA, but actually that's a good case in point. NAMBLA members aren't doing anything illegal until they actually break the law. The same thing used to be true of copy protection circumvention: you could sell and own copy protection circumvention equipment or software. That has now changed. It used to be legal to buy a device to circumvent Macrovision copy protection on videos. I bought one so I could play legally purchased DVDs on my PC, through my VCR (not to tape them, just to watch them.) I haven't checked for certain, but if these devices aren't already illegal under the DMCA, certainly their software equivalents are.
> There aren't any corporations selling DeCSS, though - why is that?
Uh, maybe because its free?
Yeah, yeah. My point is that it's illegal under Federal law. A company selling DeCSS could be shut down in short order. Yes, you might be able to order a hooker online. But that's only because there aren't any big corporations who really care to stop you. That's not the case when it comes to the sort of "subversive" software raised by the original query.
Re:Usenet? Definitely. (Score:2)
Kinda good in a way, even just for nostalgia, I can remember the waiting and hoping for the postman to come when you are expecting a letter from someone you care about, and who even now doesn't know the intrinsic joy of parcels....
Re:unique identifiers [OT] (Score:3)
The ability of this algorithm to generate "globally" or "universally" unique identifiers relies in part on the fact that network adapters contain a node address which is issued in blocks to network card manufacturers by the IEEE, so is guaranteed to be unique. Here's some info about UUID generation [opennc.org].
While processor IDs can be used to identify a system, there currently isn't widespread use of these numbers in standard software components.
Re:You are having logical errors (Score:2)
This a good point - our society hasn't reached the conclusion that code == speech. I hope it does, but I'm not optimistic.
On the other hand, you have to wonder if it really matters. Sure, DeCSS is "illegal", but I have a copy of it, and so do thousands of other people. Technically, J-walking is illegal too.
Of course, this is a cop-out- I understand that there is a profound difference between "legal" and "getting away with it", and it mostly has to do with society being honest about what it thinks is right and wrong.
Re:ZKS is insecure (Score:2)
A couple of issues to respond to. Every ZKS server is not on a carnivore monitored network nor are they in the US or canada or even run by companies in many cases. Many ZKS servers are run by private individuals, with no legal obligation to support Carnivore (under current law). So, it does not follow that all ZKS servers are or could be carnivore monitored. Additionally, reply blocks in the ZKS network *do* allow for latency time, so traffic analysis is not as straight forward as you might think. It still needs cover traffic and remixing, but its not as simple to defeat the model as you make it out to be.
Regardless, presenting an array of options to the end user is much better than just shoving the highest security solution at them. High security remailing is complicate and requires the users to understand how to use the remailer network in a secure manner. Which includes dummy (cover traffic) messages, remixing, long chains, rotating reply blocks and so on. ZKS is easy to use, setting up nyms to do re-mix is not a simple matter for most users.
Presenting the various options, in a limited slashdot posting, gives the user the option of finding out more and educating themselves. The post was not intended as a complex lesson on the pros and cons of the various technologies available for protecting your anonymity.
Python
Legal tangles... (Score:2)
"By clicking "OK" you agree not to hold the distributor of this software program liable for anything" type of thing. Even throw in a clause whereby the user agrees not to use the product for any number of "infringing" uses.
This protects - using another totally insane act of law - the UCITA -- the DeCSS distribution at a number of levels.
1. Representatives of the MPAA obviously opened the distribution and looked inside - thus agreeing not to sue based on the contents of the archive. If they didn't click ok and still have examined the contents it can only be becasue they bypassed the protection on the archive and thus have fallen foul of the DMCA itself.
2. The end users of the software too have enterd into (and been bound by) the contract not to use the software for infringing uses.
Done properly and worded right this would put the DMCA in conflict with UCITA. Hopefully one of them would give, and half our current problems would be over.
WARNING: Caffine levels low. Output may be incoherent.
Re:You are having logical errors (Score:2)
Forgive me quoting myself, but I just wrote a message about this [slashdot.org], attached to the "Lawsuits Suck" article. To me, the important point is this:
"...having laws in place which everyone routinely breaks, provides yet another way in which the government can harass citizens if it so chooses. [...] Laws are instruments of control, and unnecessary laws are dangerous. They can sit on the books for years until the wrong person gets into a position to abuse them."
Gotta go hide, I hear some black helicopters outside...
haX0r comment unfair (Score:2)
However, I also have to agree that openness is the only way to win. As long as software writers can be the David vs. the corporate Goliath, we have a chance to sway public opinion. There are two problems to overcome. The first is that the people with political power owe their position to the people with money, i.e. korporate Amerika. The good news is that politcians have to pay attention to public opinion.
The other piece of bad news is that the general public doesn't have a lot of sympathy for techies. We could easily become the modern equivalent of Salem witches if someone with enough juice decided to push the right buttons.
That brings us back to openness. People distrust what they can't see. People also believe what they see in the media. I'm sure the average person believes that a hacker is someone who breaks into computers and writes viruses. Writing underground software is only going to further those misconceptions.
That said, we could really be headed for a dystopia a la Shadowrun. I know that I won't be working for a megacorp. I could be asking these same questions in a few years.
Re:Grow up (Score:3)
It sounds reasonable, but I think it only describes half the equation. There's a question of balance to be examined.
While large cooperative groups offer advantages, they also have a number of qualities which I think are largely uncontroled today.
Maybe the advantages in the pseudo-symbiotic relationship we share with corporate entities are enough to overwhelm any worries you might have as to the more destructive qualities corporations exhibit, but I choose not to wear blinders or to see the world in black & white, and certainly not to tell people who might have legitimate concerns to 'grow up', just because I would rather not face the nauseating possibility that maybe there is something terribly wrong.
So I'll definitely be keeping at least one of my feet squarely in the, 'Corporations are the Evil Empire,' camp you described, simply because corporate entities do lots and lots of morally questionable things which make the world crappy for lots and lots of people. The fact that you can clearly write well, means you're not ignorant, so I won't bother listing off any of the ton of available examples of corporate greed and willfully reckless behavior. (When profit is god, how money is made is unimportant, so long as it's cheaply done and doesn't leave shit in your own immediate corner of the pond.)
Also. . .
'The other possibility is that instead of creating something of value yourself, you feel an adolescent urge to be a big hero to other adolescents by finding ways of stealing things of value created by others.' [snip] 'why don't you go out and create music or great films or whatever, and then give away what you've traded the hours of your life to produce, instead of trying to give away the hours of other peoples' lives?'
Yeah. . .
Fair enough. Except you're again looking only at the portion of the equation, (that which clearly makes you feel comfortable in your own philosophical rules set). Hate to say it, but. . .
The problem is one of fairness. The people who make music don't ever receive the lion's share of the profit. I'm all for a system which will put a quarter into the hands of the artist for every track of music I decide to keep, and keeps the millions of dollars out of the hands of the non-creative music execs who currently take nearly all of the profit.
And take stealing the content from DVD's. I think that's entirely fair. -The content of a DVD has usually made its money back with lots of profit by the time it plays theatrically world wide. The disks themselves cost pennies to press. If DVD's cost eight bucks a unit, I'd never rip one off ever again. As it is, they regularly retail for over thirty dollars. That's just plain greedy and unfair. The 'competition' which is supposed to bring us fair prices clearly doesn't work. (Gee? There are content cartels? Who would have thunk it!)
Currently, piracy is the only semi-organized structure which has a shot at bringing about fairness in the market place. Shucks.
Sure, I sometimes feel like I'm wielding a metaphoric lightsaber, but that's only because I feel that I'm being manipulated and taken advantage of by a metaphoric evil.
And I don't wear blinders made from half-reason.
-Garund
Balance is everything and we don't have enough.
Re:What exactly are you hiding from? (Score:2)
kaphka said: The public-at-large will never support hackers. The reason we have this world is because most people want security, not freedom. The belief that the desire for freedom is universal has been the undoing of every reform in history.
The only system that will guarantee freedom is one that supports individual rights, power and freedom over all other concerns, especially concerns of safety and security. It would have to have this support hard-wired in, without the ability of the will of the majority or judicial review to override the central idea of individual freedom.
The US doesn't have such a system. Even if the US were the democracy it sometimes claims to be, that would only support the will of the majority, which is for security and not for freedom.
If voting could change anything, it would be illegal. For voting, substitute anything.
These openly dissenting voices are needed in addition to, not instead of, hidden action.
Ellen
Re:anonymous maintenance (Score:2)
The jurisdiction of US federal law is US territories plus US citizens. This is common of most countries, e.g. the UK (well, England and Scotland to be precise) use this to prosecute people who use child prostitutes in Thailand. This is how Mossad could justify snatching Mordechai Vanunu in Italy.
There was a case recently of Americans in tax exile in the Carribean against whom a writ was issued by a redneck judge somewhere for tax evasion (probably the same one who ordered the handover of a German company's domain name to a South Carolina company, only to be frustrated by the limit of his jurisdiction) - there is no way for the US to obtain an extradition order (that depends on satisfying the local courts of the case too) but if these folks ever set foot back in the US they will be arrested.
Life, liberty and the pursuit of lobbyists. Enjoy!
Leverage Frameworks - Post Only Subversive Parts (Score:2)
It's preferable if these are open source, but they don't have to be to suit your purpose; for example Metrowerks [metrowerks.com] PowerPlant is the most popular application framework for the MacOS, and although it is a commercial product it is inexpensively available and when you do buy the Codewarrior development system you get the PowerPlant source code on the installation disk.
You can even develop an open source framework yourself and publish it openly, and invite in contributors publicly, and distribute non-subversive demo and test programs. Alternatively, you can add functionality to frameworks that almost suit the purpose and submit your patches back to the original maintainers.
This will save you work, although you may have to write "adapters" to be able to use someone else's library for your own purposes, it will increase reliability of your product, because the framework will have already been debugged by someone else and also tested under a wider variety of circumstances than it will encounter in your code, and you can concentrate your work on the particularly subversive parts.
Then you post only the "interesting" parts of your source code, and provide hyperlinks to the needed application frameworks in your build instructions. Be sure to include the version numbers needed for this build of your program, and if the sources to any of the frameworks are signed with a public key, include the key which those sources were signed with when you got them. That way you can be sure future programmers can rebuild the same program as you did.
It may well be that you have a large application but only a few source files and some build instructions to upload, which could be done off a floppy disk at a public access terminal. If you upload these to a few free webhosting service pages, then email the URL to a bunch of warez site maintainers, your code will be looked after.
Note: to find lots of warez sites (and even more serialz sites) go to Altavista [altavista.com], click on "Advanced Search" and enter:
Probably only 10% of the sites you find will actually have live warez (they get taken down quickly) but some patient hunting will find you any software title you want - but of course your objective here is to contact the warez site maintainers so they can introduce your program into their archive system.Note that if you want to build a Windows application you can build it with Cygwin [redhat.com] (a GNU shell environment for Windows including gcc) so you can be sure Microsoft doesn't embed Globally Unique Identifiers in your code. I'd also suggest that when you make a windows build, you buy a brand-new copy of windows 98 (pay cash), install it on a freshy formatted hard drive, build your binary, upload it, low-level format the hard disk you built it on and throw away the Windows 98 installation disk and all the materials that came with it. It's probably hard to get away with installing a development system on a public access terminal.
If you don't want to use a public access terminal (after all, you might be recorded on a surveillance camera, or the coffee shop waiters might remember you skulking around), then use Zero Knowledge Systems' Freedom [freedom.net] to anonymize your web access.
Note that the way Freedom works is your HTTP packets are multiply encrypted with the public keys of the Freedom Network's servers, then "unwrapped" one by one as they pass through up to three servers until they are passed unencrypted to the public net at a faraway place.
Freedom provides both anonymous web browsing and anonymous email send and receive.
Some sources for open source libraries:
On the other hand, when you write new code, it is definitely worth while to snip out little bits and make sure that they will compile and run on their own, or depend only on other readily available libraries. That way you can create a library yourself.
The book More C++ Gems [fatbrain.com] has some articles on Large-Scale Software Architecture that discusses reducing cyclic dependencies in software projects, in part so that the projects can be rebuilt faster but also so that they can be unit tested in smaller parts and the parts can be extracted out and reused in other programs - although the claim is often made that object-oriented software is more reusable, this claim is baseless unless good engineering practices are observed.
Re:Ever used a BBS? (Score:2)
Windows9X machines are good candidates, you don't even need to log in, just hit cancel.
As for BBS's, If I recall correctly, phone companies keep logs, all they have to do is get the log from the phone company and figure out who was connected long enough to transfer the file.
What we need is legal cure, not subversion. (Score:2)
Re:You're Confusing Your Objectives... (Score:2)
You are a sick sadist.
A Dick and a Bush .. You know somebody's gonna get screwed.
Use Linux authoring tools for CDs (Score:2)
OK for small stuff but what if they'd kill you? (Score:3)
Or provided secure communications channels for reporting human rights violations from within repressive regimes?
Or suppose the software in some way helped promote meaningful political change in a repressive regime - and was developed within the territory of that regime?
No, really this is an important question and needs to be addressed in a serious way.
Re:I cannot resist!!!! (Score:2)
WWJD -- What Would Jimi Do?
Re:Let the public distribute the code for you (Score:2)
I think that relying on a mini-virus may well turn out to be a bad idea; every time someone has proposed a "good" virus idea, someone has eventually shot it down. In any case, legal systems are perfectly happy to prosecute mules, too, leading to a socialization that says "don't ever use an unknown CDrom" -- especially the FTP site mules; they'd be subject to "cease and desist" that prevents them from accepting software for which they can't identify the author.
What about "Distributed distribution" ? (Score:2)
For example: Gasoline is legal. Vita-Grow is legal. Combining both is legal. Blowing off a part of Oklahoma with the mix is not. But no one could have sued the guy who sold the gasoline to McVail.
Therefore, if I was to publish a set of "modules" and the instructions to combine them together (remember. The anarchist cookbook is still legal to read/sell last time I checked.) you could be untouchable. Your specific modules by themselves are harmless... It's those evil h4ck3rZ that found a way to do bad things with it.
Re:This is a toughie, for sure. (Score:2)
Rich...
Re:Depends on the road you want to take. (Score:3)
Now, it's not enough to just call it a school project. You need to be really doing something original and worth publishing, but you can do quite a bit legally when your intentions are academic. We had a good speaker from Lucent give a talk on this exact problem recently (at Rutgers). this is what he told us paraphrased:
I'm going to tell you three stories about three diffrent people working in cryptography, but first I'm going to tell you the endings to the three stories and let you take a guess as to which stories have which endings. Two of these folling people went to jall and one recieved academic laurals.
The first guy reverse engenered top secret government encrpytion chip and was told not to publish the results by his boss (and maybe NSA), but published the results in the New York times anyway. The second guy wrote a program to help him watch DVDs on his computer under Linux instead of Windows. The third found a major flaw in bank security for financial transactions and reported this to the company handling the financial transactins.
Well the first guy (our speaker) recieved great academic awards, the second guy (Jon Johanson) spent a night in jail, and the thrid guy went to jail too (I donno how long). Actually, the third guys story is really intersting. Apperently the banking company said "no we do not believe that any money could be stolen with this exploit, could you prove it to us by making a transfer." the guy made a ransfer and they said "Oh you've stolen some money so we are going to throw you in jail." The implication being that they were tring to shut him up, so they tricked him into doing somthing illegal.
Anywho, the moral of the story is that you can get away with these things if you have a PhD and work for a security company. I would say that people who are not any whare near getting a PhD in crypto, but want to publish subversive stuff should take their message to the academics. Specifically, you should get a respected academic as a coauthor for a paper and get your paper published in a resprected jurnal.
Re:This is a toughie, for sure. (Score:2)
Me either. In fact the whole post seemed kinda wordy and self serving ultimately being an advertisement for his CD's and (cough!) recording studio.
Rich...
Re:Careful, posters (Score:2)
Re:You're Confusing Your Objectives... (Score:2)
A Dick and a Bush .. You know somebody's gonna get screwed.