Triangle Boy Lives 209
mlinksva writes: "Safeweb cancelled their free service late last year, but their P2P anonymizing proxy, Triangle Boy, has been spotted in the wild (south of Fort Worth, Texas). 'Because of its stealth nature, the P2P software does not show up in reports from many filtering products and the administrator doesn't even know the problem exists and has no way to check it.'(via UniteTheCows)."
Yeah. Wow. (Score:5, Insightful)
"The results were startling," said Chad Ingram, network technician at Crowley. "The only filter we tested that stopped Triangle Boy use was the 8e6 Technologies R2000. Then, using the 8e6 Enterprise Reporter, we took a look at the logs to see if we actually had users trying to contact the Triangle Boy network. We found that in the first 48 hours, users had gone to the primary Triangle Boy Website over 30 separate times."
Fucking fancy that! The only way to detect this evil P2P software is to use this peice of software. Of course is just so happens that the people who discovered the shocking truth also sell that product.
It must be the wildest fucking coincedence in the history of computing.
Re:Yeah. Wow. (Score:1)
Oh no! (Score:4, Insightful)
Not only do they get their press release on siliconvalley.internet.com, they get a free ad on Slashdot too!
Re:Oh no! (Score:3, Funny)
Re:Yeah. Wow. (Score:1, Offtopic)
(craws back underneath bridge)
Re:Yeah. Wow. (Score:2)
Some words are dirty! My mum told me so!
Re:Yeah. Wow. (Score:2)
Yes it does, (Score:2)
So? (Score:5, Interesting)
*shrug* Just a thought.
Re:So? (Score:4, Insightful)
Re:So? (Score:1)
Re:So? (Score:3, Interesting)
Accidentally? Bull. If that were the case, then the filtering software would allow the student the option of immediately overriding it. If, say, a student were surfing Slashdot and accidentally clicked on a hidden porn link, they'd get a window explaining that the site is blocked for sexual content. Then they'd click a confirmation button (or even have to type out "allow site" to prevent accidental clicks), and they'd be able to surf the site. But that's not how it works.
Re:So? (Score:2)
how is the management going to be able to spend all day wacking off to porn if they have to go around making sure the employees aren't circumventing the firewall?
Triangle wins. (Score:5, Funny)
Triangle Boy hates Filtering Boy,
They have a fight, Triangle wins.
Triangle Boy.
Re:Triangle wins. (Score:1)
Re:Triangle wins. (Score:1)
Your days are easily made, apparently.
What's to keep.... (Score:3, Insightful)
P2P (Score:5, Insightful)
The same function as Triangle Boy can easily be duplicated by anyone with a linux box on a permanent Internet connection. Just set up an HTTPS squid proxy.
Clever users will also note that you can tunnel this over just about any port you want. Make this an encrypted tunnel and no filter in the world will detect it. If your school/network allows even a single TCP port out to the Internet you can do this. (Some places allow arbitrary TCP ports to be forwarded via the HTTP proxy. Other places may have a SOCKS or similar proxy available. Those would both work for this in the event all direct connections are blocked.)
I do miss Safeweb. That open proxy was very helpful for casual browsing. The closest non-open substitute I've found is http://www.anonymizer.com.
Not all web proxys are p2p software, but... (Score:3, Informative)
...or SSH (Score:2)
The same function as Triangle Boy can easily be duplicated by anyone with a linux box on a permanent Internet connection. Just set up an HTTPS squid proxy.
You can do this with SSH too:
ssh -L8080:localhost:8080 yourhomeproxy.org and set http_proxy=http://localhost:8080/Re:...or SSH (Score:2, Informative)
ssh -D 1080 yourhomemachine.org
Point Nutscrape or Mozilla to localhost port 1080 for the Socks4 proxy. Everything will go over the SSH connection and be proxied by your remote machine without a need for Squid or an explicit web proxy. Don't forget to ask your local security team if this is permissible before doing it though! It may be a big violation to circumvent the access controls in place to support a local security policy. You can, may, and will lose your job over it. Make sure it's worth it.
Re:...or SSH (Score:2)
Yes (Score:3, Interesting)
Re:P2P (Score:3, Interesting)
Clever users will also note that you can tunnel this over just about any port you want. Make this an encrypted tunnel and no filter in the world will detect it.
Unless the filter just blocks all encrypted connections to unknown sites.
-a
Re:P2P (Score:1)
1. What does an encrypted connection look like? It's not like a software designed to get around filters will advertise what it is doing. I supposse you could look at the data and only let it by if it looks like text, maybe by word frequency, but what happens when the Spanish class goes to look at spanish language sites? Filter freaks and thinks it's encrypted. Yes, you could add language detection and have patterns for all languages, but how many companies do expect will provide these for free, and how many schools will pay for the upgrades.
I'm sure there are other ways to try and guesss if somehting is encrypted, but there are just as many was to fool those things as well.
2. Who gets to develop this list of known sites? And how often will it get updated? Does it include just the domain name, or the whole url? Is the Google cache on the list?
IMHO filtering is not the solution. Everytime a filter gets tighter, its likely to restrict some content that isn't intended, and two weeks later, there is a new way around it. The only one who makes out is the company writing the filter software. I'd rather that school budgets be spent teaching children, instead of trying to hide the real world, no matter how unseemly, from them.
Crypto + Stego (Score:1)
Unless the filter just blocks all encrypted connections to unknown sites.
Unless the proxy steganographically hides its encrypted data inside what appears to be normal text.
Anyone know anything more about this? (Score:4, Interesting)
According to this article [newsfactor.com] it works by spoofing the the source address. I know at least my firewall would block that.
And furthermore, it needs to contact a server somewhere (that is, another PC running triangle boy). Now, unless they rely on word-of-mouth to tell people where those servers are, they would have to have one or more (easily blockable) servers to hand out IP-addresses and port numbers to connect to.
I don't know what's the most frightening part. That administrators think they must block users instead of simply having strict but reasonable rules that people will understand and follow? That windows let users install programs like triangle-boy without administrator privileges (or that administrators regularly give users administrator privileges). That most commercial firewalls don't block spoofed addresses? That administrators who for some reason want to lock users in don't know about Triangle boy?
Installing programs in /home/pinocchio/bin (Score:1)
That windows let users install programs like triangle-boy without administrator privileges (or that administrators regularly give users administrator privileges).
The Microsoft Windows 2000 operating system allows unprivileged users to install programs that don't 1. write to the registry outside of HKEY_CURRENT_USER, or 2. write to the filesystem outside of /home (called "/Documents and Settings" in English versions). So do most UNIX systems.
Re:Installing programs in /home/pinocchio/bin (Score:1)
Only if the ACLs are set up poorly.
Re:Anyone know anything more about this? (Score:3, Informative)
IIRC, the data is sent to your machine via forged UDP packets. The client on your machine (which is also the proxy for your machine) then reassembles the packets and forwards them to your browser.
Checkout the TriangleBoy Whitepaper [safeweb.com]
Re:Anyone know anything more about this? (Score:3, Informative)
Unless I'm reading this wrong, or the author of the article doesn't know what they're talking about, the spoofing occurs outside of your network. Apparently, Triangle Boy knows that Safeweb IP addresses will be blocked by some firewalls or filtering software, so the return traffic from Safeweb (e.g. viewing web pages) is spoofed to the IP address of the Triangle Boy host. It's not like clients inside your network are spoofing their source addresses. If that were the case, you would be right and any decent firewall ruleset would block such activity.
I know at least my firewall would block that
Your firewall would block address spoofing from the inside, but not from the outside like in this case. I don't know the details, but I would think that the spoofing on Triangle Boy's part would have to take into account issues like TCP state and TCP sequence numbers to work properly, and IF these issues are taken care of, nothing would look suspicious to your firewall.
Filters are in danger... Oh no. (Score:5, Insightful)
Re:Filters are in danger... Oh no. (Score:2, Insightful)
Did everybody on campus go to chapel together?
Did they also have lights-out in the dorms at 11pm, after the "Dorm Mother" made sure that all members of the opposite sex had signed out and left?
Did they hold seminars explaining that "self-abuse" could lead to blindness and hairy palms?
Did they ban Elvis for swiveling his hips, and look askance at all the "groovy" kids who went to the campus rally for Adlai Stevenson's presidential campaign?
Policies like your uni's scare me a lot more than the thought that some geek might be pullin' his pud to pictures of Paulina Porizkova.
Re:Filters are in danger... Oh no. (Score:1, Offtopic)
You're showing your age, bud.
Re:Filters are in danger... Oh no. (Score:1)
It's the Adlai Stevenson part that shows age.
Need Link to Source Code and or Binary (Score:3, Interesting)
But I gave up trying to find it.
Anybody wanna post where to get it?
Also looking for it on p2p networks...
haven't found it yet
Re:Need Link to Source Code and or Binary (Score:5, Informative)
---
The source code for Triangle Boy 1.0 is available immediately. Those who wish to volunteer to host a Triangle Boy machine can download the free program from the SafeWeb site at http://fugu.safeweb.com/webpage/tboy-1.0.3.tar.gz
Re:Need Link to Source Code and or Binary (Score:1)
Re:Need Link to Source Code and or Binary (Score:1)
Re:Need Link to Source Code and or Binary (Score:1)
I don't necessarily want to run Triangle Boy for all and sundry oppressed peoples of Noliberty-istan and pointy-headed-boss.com.
But I'd like to run it for... me. That is, I'd like to be able to https from work to my box at home, have my home box fetch pages from not-approved-websites.com, and re-send that data, encypted, to my work box.
The "obvious" solution seems to be to run Apache with SSL, and create an SSL'd frame around a cgi program that does nothing other than forward. (I'm assuming that clicking a link on an encrypted page generates an encrypted GET; this may be an unfounded assumption.)
Given that I'd already running a web proxy on my home machine, I wonder if anyone has a better suggestion?
Making your own personal tboy (Score:1)
Re:Need Link to Source Code and or Binary (Score:2)
I use it daily...
MPAA on the prowl! (Score:1, Funny)
Re:MPAA on the prowl! (Score:1, Informative)
TMBG (Score:1, Offtopic)
Re:TMBG (Score:1, Funny)
Public Schools (Score:3, Insightful)
From what I saw in my time in the US school system, this sad, ironic situation pretty well sums up how the school system here works.
Re:Public Schools (Score:1)
they have to have control over the people in the school to accomplish their goals of structuring the environment in the school, and anything that detracts from the percieved goal of the syllabus in classes is undesirable.
now, i don't like it, but i accept it, even if it SHOULD be changed
Re:Public Schools (Score:2, Insightful)
Schools need to wake up and realize, if they haven't already, that they need to just deny everything and have a whitelist of acceptable sites. That's the only way they'll ever make sure the kids aren't accessing porn and inappropriate content. There need to be all-inclusive sites for educational institutions to subscribe to that include all the tools a student would usually need to do research.. encyclopedias, dictionaries, filtered access to periodicals online, etc.
Re:Public Schools (Score:1)
I'm sorry but I really dont think such an oppresive level of control will help at all. ou have to remember certain pertinent areas of psychology to know that the harder and stricter you are, the harder someone will push back. In such an environment - a few kids WILL HACK - and some will probably be succesful - even if there method is getting the librarian to retype their password and nicking it(a common one even in the school I went to - we had a small LAN). A blanket ban on anything the school might not agree with is more likely to teach the children that all authority is oppresive (and should be rebelled against) than that pron viewing is not acceptable.
I remember we used to have beebs- which were all replaced by PC's. All the coder types(okay H4x0rs) were dissappointed because we had no access to programming tools - not even a command prompt at first. Although VBasic was clearly on the network -access was denied. We quickly got access to that, and found (having never hacked LANS before) that the security was incredibly poor. The funniest thing was when they disabled my personal user account I wasnt using because I hacked a teachers account which I continued to use - DUH.. And the teacher didnt even attempt to change the password we all new(not really hacking - just stealing a bimbo's password). We originally had just used her account to change our own accounts so they had access to all the software - but following the accounts being locked we just used hers for everything. Although to this day I still VBasic will never live up to BBC basic - ah back in the day...
Re:Public Schools (Score:2, Funny)
How long before you start supporting it and enforcing it?
Re:Public Schools (Score:2)
If a kid wants to learn about technology, hacking, breast cancer, sex, or unpopular politics during the time when they're forced to be in school but aren't being instructed (from what I saw, the computers get 90% of their use during the lunch hours, with every computer in the school being taken up by students during that time), I don't see what's so wrong with that. The schools, on the other hand, want to make sure that the kids only learn what they want them to learn. That's a way to keep kids stupid and docile, not make them smarter and more worldly. It goes against every reason and principle behind education.
Re:Public Schools (Score:1, Flamebait)
Not only that, but the school library doesn't carry back issues of Playboy. Someone should write to Congress and protest this egregious oversight. It's clear that their failure to carry this fine literary magazine is part of a draconian effort to silence its political messages.
Re:Public Schools (Score:1)
Re:Public Schools (Score:2)
Nowadays the schools are being used to develop consumers instead of teaching.
LV
Re:Public Schools (Score:3, Insightful)
On the other hand, I probably wouldn't be totally thilled with where you live either--humans are so troublesome.
Overlooking Elementary Security (Score:5, Insightful)
. . .
Boy does this sort of advisory wind me up. FUD about users downloading applications, I've seen this on almost every pitch for expensive firwalls and security consultancy recently.
This ought to be so simple - do not allow users to have sufficient priviledges to install software!
Problem solved.
Okay, before I get flamed, this won't work for developer teams or your admins - for whom I merely suggest you can implement a draconian contract - i.e. fire anyone using any software not explicitly authorised (a minimum policy imo) and have a regular *external* audit.
Neither will this work for networks of Win9x clients, because you can't set appropriate secuirity policies. However you could always get SMS from M$$$$ or write your own scripts to call registry entries and check them against a permitted template so as to flag suspicious installations. At the end of the day it may even be worth upgrading your clients. Or just installing Linux and StarOffice, if you can, he he :). But with respect to upgrading even say from Win9x to Win2k, which ain't cheap, it's still probably less expensive than all the FUD claims - even the reality - of lost security and lost productivity from unauthorised use of your network resources and manpower.
Oh yeah, and you *do* only open ports explicitly at your firewall, not close off ports in response to the latest "advisory" don't you :-)
Not permitted to install (Score:2)
It is a very stable NT network, it works well.
The only real issue is that you have to jump through hoops to get anything non standard installed.
Most users do not need to install applications on their computer.
Re:Overlooking Elementary Security (Score:1)
Stealth installers (Score:1)
do not allow users to have sufficient priviledges to install software!
write your own scripts to call registry entries
Some programs' installers do NOT write to the registry and do NOT write outside of the user's home directory. How will the Windows operating system detect such an installation?
fire anyone using any software not explicitly authorised
So somebody who in the course of his or her employment happens upon a site with a Java applet (applets are programs) should be fired?
Re:Stealth installers (Score:1)
First of all, the point is about not allowing users to install software is a moot. You just you're pc to the network, and nobody can do anything about what sort of softwares you install.
If you don't want people to install software on a machine you control, well, control it. Make it impossible to execute software for your home dir or write to any other part of the hard disk, and you don't care if the program uses the registry.
Re:Overlooking Elementary Security (Score:1)
Blocking Free Speech (Score:5, Insightful)
Re:Blocking Free Speech (Score:3, Interesting)
Excellent statement.
It won't be long before our ISPs consolodate into one company, and we'll have to do the same type of software on our dial-up and broadband connections at home to let us access news and information that wasn't spoon-fed to us by Disney/AOL/TW/MSN.
And if you're a sociologist doing online research of, for example, the impact of evolving internet connectivity in middle-eastern countries, you might want some encryption as well, to avoid that visit from your friendly local FBI agents.
Re:Blocking Free Speech (Score:2, Insightful)
or else you'll make them even more suspicious and they will closely monitor all of your telephone calls, financial transactions, email correspondence and web traffic for the next few years....
How much of "a problem" is it? (Score:3, Interesting)
It seems to me that if the Administrator isn't even aware that it's happening, it must not be too much of "a problem", at least not yet. It's obviously not bringing the network down. Of course as the P2P network grows it might become a problem if users do not act responsibly.
Of course network usage is only part of the equation. Using the network to steal intellectual property is already being used as justification by the entertainment industries to ram digital rights management enabled hardware down out throats.
Yeah, we all know it is really about profits, being able to prevent people from exercising their fair use rights and thus artificially create a market where the music and video industries can charge us for every piece of music we listen to or video that we watch. Eventually we'll all have to pay EVERYTIME we listen to music or view video because it will all be a service. We will pay each month a little for this service and a little for that service.
We won't own CDs and DVDs any more. In their infinite corporate wisdom, the remaining few largest corporations that haven't been gobbled up by other mega-corporations, will simplify our lives by removing the burden of actually owning anything. Won't that be wonderful! Just like John Lennon said "no possestions. .
I think my original point was that the
Arrgh cut off in the middle of a rant! (Score:1)
I think my original point was that the bandwidth usage apparently isn't a real problem yet. Sharing information is what the internet is all about. P2P computing IS a big part of the future however don't steal IP because there are people out there that will use any excuse they can to try to take away our right. Let's not give them any extra ammunition.
Re:How much of "a problem" is it? (Score:2)
This of course, is the solution to the whole mess: stop buying CDs and DVDs. Problem solved.
Music will not die for lack of corporate sponsorship. Only corporate-sponsored music will die.
Re:How much of "a problem" is it? (Score:2)
In short: You've ranted quite far off-topic.
Re:How much of "a problem" is it? (Score:2)
My post was dead center topic.
Re:How much of "a problem" is it? (Score:2)
Anonymous web access. That's what TB does. That's all TB does. It does not do gaming, and it does not do file sharing (except in the sense that forwarding HTTP requests and responses is file sharing).
Re:How much of "a problem" is it? (Score:2)
Re:How much of "a problem" is it? (Score:2)
P2P doesn't mean "file sharing" or "gaming", it simply means "peer-to-peer". There are lots of things that can be done on a peer-to-peer network model that have nothing to do with the former applications.
Re:How much of "a problem" is it? (Score:2)
I admit that I have never run TB so I could be wrong but I am finding myself not buying the anonymous web browser story.
Re:How much of "a problem" is it? (Score:2)
Got it?
Re:How much of "a problem" is it? (Score:2)
still alive..... yes (Score:4, Informative)
That is until someone in Taiwan spammed a whole bunch of people with my IP address advertising it as a way to get around Chinese Internet censorship (my friend translated the Simplified Chinese in the e-mail). My ISP found out that my IP address was in the e-mail and was pissed and suspended my account (Ironically not because I was running Triangle Boy, but because my IP address was in the e-mail. They though *I* sent out the spam!) I just shut down the program, but lesson learned I guess.
Re:still alive..... yes (Score:2)
I'm gonna go read the white paper now....
Re:still alive..... yes (Score:2)
the administrator doesn't even know the problem ex (Score:1)
Filtering from what? (Score:2)
I have a big problem with filtering. Especially in public schools and universities. First of all, what do you want to filter? Porn? Hate sites? Please, give me a break. If somebody wants to find porn, they will find it anyway. My high school spend a lot of money on filtering software only to find out that I could simply look up a free proxy [google.com] put the it in my preferences and browse what ever I wanted. With filtering software I found out that I could not do any reseach on the topics of breast cancer, sex education and related stuff. All because they had words like "sex", "breast" and "vagina" in them. I really think that our public schools and universities should not implement cheesy filtering systems that waste our taxpayer's money. Afterall, kids will learn about sex from different sources that are widely available. Just take a look at Cosmopolitan [www.cosmopolitan] or Maxim [slashdot.org] these magazines can be seen at any grocery store and anybody who can read can pick it up and read an article on sex and orgasms.
Re:Filtering from what? (Score:1)
The translator couldn't find any Korean words, so the web page was just served in unspoilt English.
TIP: This works well on RM networks in the UK, if anyone is using one.
Before you think tboy is safe in US, read this: (Score:1, Informative)
If your speech or desired access is offensive to the Chinese government only, you will be safe, but if it is offensive to the US, think again.
That old Double standard (Score:5, Insightful)
When the subject is Spam, I see lots of people insisting that they have the right to control what is on their computers. (True)
When the subject changes to filters, suddenly the people who own the computer suddenly lose the right to control the content? The Company you work or or the school that you attend owns that computer that they installed the internet filtering software on, and they have as much right to "censor" internet access on their computer as you have to "censor" email from spammers on your computer.
I'll admit that the commerical filtering software is garbage that often blocks the wrong sites and allows access to some sites that they should have picked up, but that dosen't change the fact that the owners of the computers have the right to install the software.
Don't like the poor software availble? Then start developing an open source filtering software that works better and offer that as an alternitive to the junk that is currently used.
Want full unrestricted access? Use your computer instead of one that was provided to you to do a job or for educational access.
Ownership as the basis of political rights (Score:2)
A lot of people say that mass ownership of property guarantees political rights, since the control of ownership limits the power base of the government or other property owners.
I think our world is turning in a scary world of property being concentrated into the hands of a few who tout the rights granted by their property ownership, which is really is an end run around the implied political rights of others.
Re:Ownership as the basis of political rights (Score:2)
Control of properity that you own is a political right.
"A lot of people say that mass ownership of property guarantees political rights, since the control of ownership limits the power base of the government or other property owners."
Yep, it proteted people in that bastion of civil rights, the Soviet Union.
"I think our world is turning in a scary world of property being concentrated into the hands of a few who tout the rights granted by their property ownership, which is really is an end run around the implied political rights of others."
There is no "right" to control other people's properity.
Re:Ownership as the basis of political rights (Score:2)
But that's what the Soviets said. The theorists behind democracy reasoned that political rights *came* from ownership of private property; rights over something you own are absolute, they aren't given to you by someone else. If the people as a whole own all the land and means of production they are less subject to the tyranny of government.
Yep, it proteted people in that bastion of civil rights, the Soviet Union.
There was no private property in the Soviet Union, which is why there was no freedom.
There is no "right" to control other people's properity.
Which is why private property is the basis for freedom, according to classical Liberal political thought.
It gets scary when most of the private property is controlled by a small group of people who use the rhetoric of liberty and property to advance an agenda that denies rights like freedom of speech to non-property holders.
Re:Ownership as the basis of political rights (Score:2)
The micro computer opened ownership up to millions of people, and that ownership has vastly increased the value of freedom of speech. 30 years ago if you didn't own a TV station, a Radio station or a printing press, your chances of reaching a large audiance were close to nil. Ownership of computers has changed that so that I can reach a fairly large audiance with this post (Hi Folks!) something that I could not have done in 1972.
If restrictions had been placed on media outlets in 1972 to protect me from the few who owned them then, there is no reason to think that those same restrictions wouldn't have been applied to the micro computer when it was developed a few years later, which in the long run would have a negative effect on my freedom of speech.
We have reached the point that used computers capable of handling most people's computing needs can be bought for less than a TV. Budget dial-up internet access is under 10 bucks a month. There are damn few people in the industrilized world who can't afford a computer if they are willing to make a minor adjustment to their lifestyle.
Re:That old Double standard (Score:2)
Certainly not from students, most of whom pay little or nothing in taxes, and who's fees are far less than the cost of their education. A large majority of the taxpayers support blocking access on the computers that they paid for.
Re:That old Double standard (Score:2)
Sorry the taxpayers have no intrest in providing you with a source of porn.
Re:That old Double standard (Score:3, Insightful)
Re:That old Double standard (Score:2)
Sorry if you want to have public properity, you have to get use to public control of that properity, and in a demoarcy that means accepting whatever restrictions the majority wishes to place on the properity they also paid for.
Now if there should be any "public" properity that some people are forced to contribute towards the purchase of even though it may used in a manner that they object to is another matter.
CIA sponsored software - prior to 9/11... (Score:3, Interesting)
"Software that promises users anonymity on the Web has caught the eye of the U.S. Central Intelligence Agency's nonprofit venture capital company, In-Q-Tel, which says the technology can help the spy agency fulfill its mission."
From http://www.pcworld.com/news/article/0,aid,41462,00 .asp [pcworld.com] Feb 13, 2001.
If you are wondering what 'mission' they are referring to:
"Internet May Threaten National Security:
Wars of the future may be fought with viruses and hack attacks, not with guns and bombs, studies say. During the next 15 years, the U.S. will face a new breed of Internet-enabled terrorists, criminals, and nation/state adversaries that will launch attacks not with planes and tanks, but with computer viruses and logic bombs, according to two reports released last month."
That from http://www.pcworld.com/news/article/0,aid,37483,00 .asp [pcworld.com]. January 4, 2001.
Open source or not, I wouldn't choose to use this software...
Re:CIA sponsored software - prior to 9/11... (Score:2)
Well, this could VERY LEGITIMATELY be used to further their mission as well. For example, a US spy in China can report back to a website or perform some other "trigger action" like posting a code word to a public forum, without the Great (Fire)Wall of China knowing about it.
It can help dissidents in (insert country threating to blow us up here) maintain communication links.
And also.. this is OPEN SOURCE. If you're so paranoid about the CIA putting a back door in, check the source yourself!
(Frankly, putting a back door in would be a pretty stupid thing to do.. it could easily be found in an open source project -- and then who would trust the CIA again?)
((HA))
Re:CIA sponsored software - prior to 9/11... (Score:2)
This is interesting...how will they prove something in court that would seem to have no audit trail?
Re:CIA sponsored software - prior to 9/11... (Score:2)
The only thing that bothers me is the idea that the CIA is just now learning about and considering open proxies
Shaun
Terrorist (Score:2)
I suggest everyone chips in and runs a copy on a dedicated server with broadband internet access.
Re:Uh oh. (Score:1)
Re:Spotted in the wild? (Score:2)
Uh, I don't think you can filter that (Score:2)