Yay Obama!

Nov. 4th, 2008 08:50 pm
ibneko: (Default)

Yay again!

Now I'm really just watching to see how the Prop 8 stuff turns out. There was a set of four girls outside near a voting place just down the street from my block who were bouncing up and down, waving No to Prop 8 signs and getting people to honk their horns.

I wore my:
[√] GAY

shirt from illinois's LGBT group to support, although... I didn't wander around much on the streets, since we got lunch in the office (we were busy launching something).
ibneko: (Default)
This is slightly disturbing. Apparently, the FBI posted fake links advertising child pornography and recorded all of the IP addresses that access those links. And then when around raiding houses.

slashdot link:

Responses by some security guys:

Original news article:

Why is it disturbing? As the article states: "The implications of the FBI's hyperlink-enticement technique are sweeping. Using the same logic and legal arguments, federal agents could send unsolicited e-mail messages to millions of Americans advertising illegal narcotics or child pornography--and raid people who click on the links embedded in the spam messages. The bureau could register the "unlawfulimages.com" domain name and prosecute intentional visitors. And so on."

And also, there are ways to trick a browser into loading images and links. If I can control content on a page, I can easily use all sorts of ways to force your browser to load another site. http://en.wikipedia.org/wiki/Cross-site_request_forgery, http://en.wikipedia.org/wiki/Cross-site_scripting, and basic head/meta-redirects would work. So essentially, if I knew about the FBI site, and I had an enemy, I could make a webpage that would automatically redirect their browser to load from the FBI honeypot link. And then said enemy would get a lovely visit from the FBI. So while said target did not intentionally click the link, they still get into trouble . . . .

In other tech news:

MD wants to make it a crime carrying up to 3 years imprisonment and a $1000 fine for using someone else's wireless connection.

The best slashdot comment is as follows:
I will never, EVER understand how the following counts as "stealing wireless access":

1) I broadcast my SSID. (Here's a wireless connection world! LOOK OVER HERE FOR IT!!!)
2) User asks, "Can I connect?" (IP address requested.)
3) I say, "Sure you can connect." (IP address loaned.)

Ok, I guess I should do it as a car analogy:

1) I put out a sign, "I will let you borrow my car."
2) You ask, "Can I borrow your car?"
3) I say, "Yes, and here are the keys."
ibneko: (Default)
... )I just the other day got, an internet was sent by my staff at 10 o'clock in the morning on Friday and I just got it yesterday. Why?

Because it got tangled up with all these things going on the internet commercially.

... )They want to deliver vast amounts of information over the internet. And again, the internet is not something you just dump something on. It's not a truck.

It's a series of tubes.

And if you don't understand those tubes can be filled and if they are filled, when you put your message in, it gets in line and its going to be delayed by anyone that puts into that tube enormous amounts of material, enormous amounts of material.

Now we have a separate Department of Defense internet now, did you know that?

Do you know why?

Because they have to have theirs delivered immediately. They can't afford getting delayed by other people.... )

source: http://blog.wired.com/27BStroke6/index.blog?entry_id=1512499
Amusing side entry: http://blog.wired.com/27BStroke6/index.blog?entry_id=1513010

It boggles and hurts the mind how... ignorant he is.

Expand Cut Tags

No cut tags


ibneko: (Default)


RSS Atom

Most Popular Tags

Style Credit

Page generated May. 23rd, 2017 04:58 pm
Powered by Dreamwidth Studios
November 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 2016