Are Flagan on Thu, 25 Jul 2002 23:13:01 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Nettime-bold] H2K2 - Hope (Hackers on Planet Earth)


A report from H2K2 ­ HOPE (Hackers on Planet Earth) Conference, July 12-14,
Hotel Pennsylvania, NYC, New York.

Presumes no previous knowledge of hacking and hopefully expands on some
previous knowledge of hacking.

-af

+ + + + +

Read_Me

H2K2 is only the fourth conference of HOPE (Hackers On Planet Earth) and the
third at Hotel Pennsylvania in New York City. From a relatively modest start
in 1994, the conference has gradually and quite impressively grown in size
from occupying only a small amount of hotel real estate to breach the
capacity of an entire floor during the most popular events. While the
earliest hacker ³conferences² (usually abbreviated Con, as in SummerCon
1987) were very informal and, sadly, often marred by arrests, the gradual
recognition of the hacker enterprise and ethic has led to large public
events like HOPE that are comprised of 12 quite exhausting but equally
invigorating hours of programming per day. Unlike other hacker gatherings
that have taken a very commercial turn, such as the DefCon extravaganza in
Las Vegas (which sidelines as the security industry¹s
peek-at-the-underground showcase), HOPE is heavily invested in the social
and political agendas that motivate and support hacker activity. The list of
speakers and topics is consequently not only cloaked in handles and obscure
network acronyms. It also includes authors and industry experts that,
respectively, have sales ranks on amazon.com and command six-figure
salaries. The common thread is a belief in a free and open society that
readily shares information and knowledge to collectively improve on the
world we live in. Faced with the oppressive culture of security and secrecy
that currently sweeps this nation, the concerns raised, the information
shared, and the stories told at HOPE resonate with an unprecedented urgency
when one considers the increasingly analogous relations between computer
networks and society at large. Each fundamentally operate according to
constantly developing and intermittently agreed-upon protocols that can be
equated with democratic principles, but each of these are also increasingly
controlled by corporate and legislative interventions. When a bona fide,
public forum like HOPE compels some audience members to cover their faces
with bandanas (others, presumably jokingly if black humor counts, sported
silly false noses and moustaches) to hide from the Feds seated watchfully in
the back, the debated lines of contention drawn in session after session
found its mirror image in the assembled crowd. You cannot ask of a
conference to be more real and relevant than this surreal scenario
advertised.

Computer hacking is by all accounts driven by compulsive and obsessive
behavior that does not rest until a problem is solved or curiosity is
satisfied. It was perhaps fitting then that sessions ran back to back on two
overlapping tracks with a third track offering an open forum for anyone to
speak their mind or report on the latest exploits. Those whose ability to
absorb knowledge was not already besieged by this bit-rate could linger in
the network, workshop and merchandise area, which also featured what
amounted to an archeology of hardware available for nostalgic
experimentation. Most, however, came equipped with their own top-of-the-line
laptops and the organizers had kindly installed a wireless network to
support the impromptu groups that formed to share their experiences at the
command line. As such, any gaps in the already overwhelming flow of input
were incredulously filled with computation and programming at an advanced
level, and considering that many participants seemed to have taken part of
their summer vacation in New York City, the sheer endurance of these
attendees should bluntly have silenced any academic, or parental for that
matter, concerns about falling standards and endemic ADD. Not everyone is of
the MTV generation and the Daytona Beach spring break crowd it seems. There
were even family values on display by hacker mums and dads who splurged on
2600 (the sponsoring magazine) caps for their offspring and sat through
complex talks on ICANN¹s increasingly dubious future with them.

This is not to suggest that HOPE was a tech-savvy version of Bible camp. But
considering the avatar nature and negative representation of ³hackers,² the
uninitiated (counting yours truly) may be excused for initially commenting
on the normality and, gender excluded, diversity of the scene behind the
screen. And the educational aspects indicated above are not really an
attempt to repackage hacker activity in a wholesome glow suitable for
wholesale consumption: education, as a transaction in knowledge, actually
sketches the very foundation of hacker activity. The central document that
supports this claim, commonly known as ³The Hacker Manifesto² (search Google
and you will find it by the thousands), was read aloud and commented on by
its author in a session entitled ³The Conscience of a Hacker,² which is the
original title given the text when it first appeared in Phrack magazine.
Written when The Mentor was not much more than a child himself, it bemoans a
disillusionment with the educational system and its stifling standards,
which are overcome by independent experimentation with computers (this is
only a short quote from the text, which was written on January 8, 1986,
shortly after The Mentor was arrested): ³I¹ve listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. ³No Ms.
Smith, I didn¹t show my work. I did it in my head.² Damn kid. Probably
copied it. They¹re all alike. I made a discovery today. I found a computer.
Wait a second, this is cool. It does what I want it to do. If it makes a
mistake, it¹s because I screwed it up. Not because it doesn¹t like me. Or
feels threatened by me. Or thinks I¹m a smart ass. Or doesn¹t like teaching
and shouldn¹t be there. Damn kid.² The Mentor added his own statistics to
the latter Manifesto point by estimating that of the roughly 150 teachers he
had been in contact with during his career as a student, only two had left
an inspirational and inquisitive mark on him through their teaching. Despite
its staccato flow and basic language, the relative simplicity of the text
hides very complex relationships between institutions and individuals, as
well as technology and society. It is fundamentally the failure of living up
to the responsibilities of these relations that is being criticized in The
Hacker Manifesto, and technology takes on the role of realizing a new set of
human relations, born from individual responsibility, that truly value
freedom and education. Perhaps easily dismissed, 17 years after it was
written, as a conventional litany against authority, the Manifesto
nevertheless had a young HOPE audience repeatedly nodding to its message.
One can suspect that the approval partly stems from the politicians¹
feebleminded, and still ongoing, attempts to improve the public school
system through testing, testing, testing, testing, testing, testing, testing
and testing. Meanwhile The Mentor has come of age to comply with some
institutional dictums, notably those of Sigmund Freud, by actually marrying
a public school teacher, but he is putting all destructive suspicions about
his early text to shame by scavenging for discarded computer parts in his
spare time to build, in collaboration with his wife, computer labs for the
kids. It appears that ³The Conscience of a Hacker² has always been a solid
work in progress.

There were other proposals aired to integrate a hacker ethic into the school
curriculum from a K-12 level. Greg Newby, a professor at the University of
North Carolina, who made an overtly strong case for hacker respectability by
wearing a tuxedo, proposed that base concepts of information value, privacy,
security and secrecy should be taught alongside basic computer literacy. As
students progress, he suggested that these concepts would get increasingly
complex with attention lent to data integrity and credibility. He also
strongly favored a move from an interface and end-user mentality toward a
curriculum that exposes the nuts and bolts of computing. Newby fundamentally
invoked the curious, motivated and talented hacker, and his or her community
of peer group communication, as a role model for such an expansive approach.
The prime lesson taught in schools, he noted, must be that honest
exploration does not get you into trouble, but serves as the very
cornerstone of progressive learning.

As the introductory paragraphs suggest, the purpose of HOPE is to share
knowledge and Javaman ambitiously kicked off the conference with ³The Shape
of the Internet.² He proceeded to dispel any fears that what was coming up
would be cloaked in technical terms and incomprehensible code snippets by
bravely drawing ³live² on an overhead transparency to illustrate his points.
Despite being blinded by the projected light, he managed to adequately
trace, with a felt tip pen, various scientific models for how the shape of
the Internet has been imagined and mapped. Similar projects have also been
undertaken by a number of net artists with varying degrees of success. Those
familiar with Starrynight, for example, will partly recognize what Javaman
arguably deemed the most advanced and persuasive attempt. By utilizing the
BGP protocol, essentially a connect list that each server maintains based on
received routing information, it is possible to define the number of edges,
or chosen connections, that radiate from each node. Using the premise that
every edge that can exist between nodes does indeed exist, it is then
possible to compile a graph to express the relations. The result poses all
kinds of questions about how the Internet is actually shaped and how its
shape is growing, and some findings revealed what we might have suspected:
most servers seek to connect via the popular networks and, secondly, routes
are chosen for economic reasons. An offshoot is that 1% of ISPs control 99%
of the traffic and bandwidth is consequently centralized, which makes it
more prone to both failure and surveillance. However, with the recent
collapse of some Internet backbones due to corporate bankruptcies, the
subject-to-failure part of the theory disproved itself as nodes immediately
found new routes when the previous hubs disappeared: the Internet did not
collapse. Javaman offered some very interesting alternatives for networking
protocols that included various peer-to-peer methods, such as the ³Fisheye²
protocol that maintains only cursory routing information toward the
periphery of the network. Perhaps the future of what we today subsume in the
Internet lies in these types of configurations?

One of the most vocal sessions came in the form of ³Crypto for the Masses,²
a panel compiled of Matt Blaze, Greg Newby, Anatole Shaw and a fourth
unknown party who declined the honors of putting HOPE on the resume. It
sought to investigate methods whereby personal identity, anonymity and the
right to privacy may be preserved in a network environment, and furthermore
to discuss the hurdles faced by crypto and its adopters. After covering the
tried and tested, but somewhat hard to implement for the less computer
literate, PGP (Pretty Good Privacy) schemes that are in the process of
disappearing, the encryption built into Web browsers became a topic.
Primarily developed to satisfy a consumer demand for secure credit card
processing, it was deemed laughable from a security point of view. More show
than tell, it is primarily there to lend an appearance of security, and the
panelists unanimously agreed that it is, perhaps unbeknownst to most
computer users, rather pointless to embed security into an otherwise
insecure environment, such as, to quote the favorite hacker example, the
Windows operating system. Metaphorically and simplistically speaking it
amounts to installing a steel door in a paper building.

Privacy, however, loves company and the question is if encryption is really
needed or desired for the vast majority of byte transactions that take place
over the Internet daily. It is a public space and most people want to be
seen and heard while browsing and expressing themselves in its passages.
While few disagree with this sentiment, it becomes problematic when
encryption is by design denied some, like regular computer users, and made
available to others, like government. Failed government schemes like Key
Escrow, which was outlined by Matt Blaze in the session ³Educating
Lawmakers: Is it Possible?,² speaks of an authoritarian paranoia that is
afraid of encryption on the grounds that it will deny (it) access to
information. Key Escrow involved the prototype production of a Clipper chip
with a proprietary encoding algorithm embedded that moreover demanded all
encryption keys to be passed on to the NSA through a backdoor.

In the ³Crypto for the Masses² panel Blaze had already made a strong case
for why widely available encryption might be a good thing all around.
Recognizing that the Internet will always be the subject of surveillance, he
suggested that encryption would only slightly diminish surveying powers by
crucially demanding that agents take an extra step to access this type of
information. On the flipside, and to the benefit of those collecting what in
their view amounts to evidence, more sensitive information will arguably be
passed along encrypted channels over the Internet, which will make it open
to a subpoena.

But if it is at all possible to educate lawmakers about such pros and cons
was perhaps inadvertently answered by fellow panelist and journalist Declan
McCullagh (www.politechbot.com) with his hilarious, and equally shocking,
anecdotes about ignorance in D. C. How about the legislative body of Dianne
Feinstein, a Democrat from California, that let out a squeamish scream when
the word mouse crept into the technology dialog and was mistaken for a stray
rodent? And as Lamar Smith, a Republican from Texas and the sponsor of the
Cyber Security Enhancement Act passed by the House of Representatives on
July 15 (the CSEA imposes the possibility of life sentences for ³reckless²
hackers), commented earlier this year: "Until we secure our cyber
infrastructure, a few keystrokes and an Internet connection is all one needs
to disable the economy and endanger livesŠA mouse can be just as dangerous
as a bullet or a bomb." Somehow, and perhaps not so surprisingly, the
instrumentality of knowledge and education has been replaced by a somewhat
irrational fear of plastic pointing devices (that are easily confused with
furry animals, or weapons of mass destruction).

A heated-to-the-point-of-boiling discussion that crept across both
security-related panels was the forthcoming introduction of the Microsoft
Palladium standard. Essentially an updated version of the principles
employed by the failed Key Escrow plan, it involves, through an already
ongoing collaboration with the chip manufacturer Intel, the implementation
of hardware controls under what has been billed as a ³trusted² computing
platform. Problem is that you may as well pay a lot less and get a nice
color TV that remains similar in scope and is less hostile to its owner.
Microsoft and its cohorts will essentially decide what you may or may not do
with your machine, and it is not even a qualified guess to suggest that
built-in monitoring and digital rights management will fit the bills that
support the unilateral trust being built here. While the science of the
project was described as retarded by those in the know, it will of course
adversely affect how the majority of users experiences computers in the not
so distant future. Put succinctly, the Microsoft advertising slogan of
³Where do you want to go today?² becomes even more of a dumb rhetorical
question. A contention was offered, however, that owners would hate their
dictating machines with such vigor that widespread tinkering with the
control mechanisms will turn the end-user population as a whole into
³hackers² and launch a new, open collectivity in computing. Similar concerns
were expressed with regards to privacy. If there were a serious spill of
some proportion, consumers would demand cryptography applications to protect
their identities and communications, if and when desired. Both projections
resound as feasible, but it would certainly be preferable to bypass
potential bankruptcy or disaster and go straight to the decent and desirable
products that respectfully take their owners and users into account.

Hackers have always believed that computers and technology have a vast
potential to make people¹s lives better. But rather than dwelling on
cyberpunk utopias and futuristic projections of the lofty metaphysical kind,
hackers have developed the skills to actually approach this fundamental
premise from a very pragmatic angle. Hacking is not, at its philosophical
and practical core, a destructive enterprise, but rather a directed quest
for the improvement of existing systems. Given how central the cause is for
the application of knowledge and skills, there were a number of talks that
addressed, as already noted, the current network environment in analogous
relation to society at large.

Sida Vaidhyanathan, a cultural historian and media scholar moonlighting as a
professor at New York University, called his keynote crack at this equation
³Life in a Distributed Age.² After collecting the usual cheers for lamenting
the loss of free speech and progressive scholarship due to copyright and
technical anti-circumvention provisions, Vaidhyanathan returned to the roots
of western civilization in ancient Greece to outline an alternative social
model based on cynicism. Derived from the philosophy of Diogenes, cynicism
maintains that virtue is the only good and its essence lies in self-control
and independence. This freedom from convention coupled with moral zeal
would, according to Diogenes, allow for a highly practical politics that
finds its expression in a borderless polis, a decentralized,
self-regulating, informed and competent political body-at-large. Our
projected cyberspace fits this revolutionary corpus, but its realization in
the Internet has of course led to limitations that force the negotiation of
more modest goals than those inspired by the cynical mold. Returning to what
brought him the first accolade, Vaidhyanathan quoted numerous sources that
seek to limit the vast hospitality of the Internet as a decentralized and
responsible space with demonizing rhetoric. The goal is to persuade the
public that the Internet, and technology in general, is dangerous unless it
is used with the proper level of supervision and control. Statements like:
³Our enemies are prepared to use our technologies against us,² which was
made by Richard Clarke, President Bush¹s Office of Cyber Security Director
(also known for his ³electronic Pearl Harbor² analogy), in relation to the
9/11 tragedy are both hopelessly vague and frighteningly encompassing. They
raise the usual questions of who ³we² are and how ³technologies² became
³our[s].² Furthermore, Vaidhyanathan contested, if the Internet helped the
terrorists buy airline tickets it was box cutters that initially performed
and aided their gruesome deed. Legislation limiting sales of sharp or
pointed utensils should according to this logic be forthcoming, but it is of
course more likely to concentrate on areas that may limit the power and
profits of the few, such as open computing and democratic networks.

A similar demonizing was noted by author Doug Rushkoff in his ³Human
Autonomous Zones: The Real Role of Hackers.² After the dot-com pyramid
schemes failed so miserably (for some) and the Internet mercifully shrugged
off business, corporations and mainstream media have increasingly started to
load it with negativity. Symptoms abound and Rushkoff noted that as early as
the Atlanta Olympics we were subjected to what the media termed an
³Internet-style² bomb. Obviously quite misleading from a technical point of
view (the bomb was presumably not modeled after the Internet but its
construction may have been available on the Internet, and no doubt
elsewhere), the language and context thrives on ignorance and lack of
contestation to support the reporting media¹s role in bringing ³accurate²
and ³truthful² stories. Storytelling consequently formed the locus of his
talk. Stories compete for believers and those that control the stories we
live by essentially shape our reality. Rushkoff quoted numerous examples of
proprietary oral traditions and Walter Cronkite¹s signature byline at the
end of his newscasts, ³that¹s the way it is,² summarizes most of them.
Within this closed and one-directional economy of exchanges, hackers emerged
as autonomous voices in a climate where independence was outlawed. By
breaking the spell of programming and feeding broadcasts into a feedback
loop, they demystified technology through shareware and made it available
for uses and contexts that were not supported by the hierarchical structure
whereby stories were, and still are, disseminated. Current attempts at
legislating the Internet and the airwaves, and even hardware (see notes on
the Microsoft Palladium standard above), seek to restore the bullhorn
mentality that hackers passionately resist. As computer interfaces and
operating systems have become increasingly opaque to produce more end-users
with entertainment terminals rather than computing platforms, hackers have
maintained knowledge of computing and not lost sight of the broader social
interaction that encodes choices and spreads information. Here rests the
autonomous zone that remains the real role and function of hackers.

Another panel presenting the Indymedia network of Independent Media Centers
(IMC) brought some of this philosophy to a practical solution. Indymedia was
developed as a continuation and expansion of an online newsroom offered
during the pro-democracy protests in Seattle. It revolves around an evolving
open source code that is distributed by participating Indymedia Web sites in
many countries. The code supports the upload of rich media content such as
images, and the sites consequently offer users the ability to post their own
news stories with a local and personal flavor. Some translation and
cross-posting takes place. Links to sites on the global IMC network are
available at www.indymedia.org.

But pockets like the Indymedia network are unfortunately becoming
increasingly rare on the Internet as licensing restrictions and fees limit
Web casting and the forceful influx of corporate interests are seeking to
silence and dominate it. Several talks dwelled on these developments and
although the topics were different, the methods encountered displayed a
clear pattern where lawyers are replacing individual policing of copyright
and trademarks for federal legislation intended to represent their
interests. How a democratic body can become the executive branch of select
corporations has of course already been answered by the recent revelations
surrounding White House ties to industry.

The panel titled ³Bullies on the Net,² featuring Emmanuel Goldstein, Eric
Grimm and Uzi Nissan, first covered the 30 lawsuits brought by Ford Motor
Company against virtually every domain name that could in some way be
associated with any of its own or subsidiary car models or brand names. A
Swede selling used spare parts for classic Volvo vehicles (a company part
own by Ford) was consequently sued for pursuing a modest and entrepreneurial
livelihood under www.classicvolvo.com. Likewise, fans of the endangered
jaguar at www.jaguarcenter.com (currently featuring a nice big-cat drawing
by Amanda, age 13) were slapped with a suit to avoid confusion between
things that purr and things that rev. Uzi Nissan, who by the merits of his
own last name claimed Nissan.com in 1994 to advertise a computer business,
Nissan Computers, which he started in 1991, talked about his own collision
with the car industry. Five years later after his entry in the domain name
root, Nissan Motor Company, also known as Datsun (unlike Nissan who has
always been known as Nissan), sued him for 10 million dollars. The legal
back and forth is still ongoing and Nissan, the man, is 2.2 million dollars
in the red as a result. Due process in this type of litigation involves
intimidation followed by an attempt to exhaust the opponent¹s resources, and
it has obviously established precedents that have little to do with basic
fairness under the law.

For those interested in subversive uses of media and still remain somewhat
puzzled by the contention last year that bin Laden was inserting hidden
messages in his video broadcasts (rather than straightforward arguments that
Americans should not hear), would have enjoyed the talk Peter Wayner
(www.wayner.org) gave on steganography, which translates as the art and
science of hiding information in digital data. Although he was hard pressed
to define ³hidden,² and was shrewdly hiding his lack of a definition behind
Goedel¹s theorem that prevents us from being logical about detection, the
methods outlined were elucidating enough to bypass such premises. Generally,
to hide data in data means that it must be inserted in places where it will
not be detectable unless you know where and how to look for it. In some
respects (and just to confuse matters further), you essentially need to know
what has taken place to describe what has happened. The Catch-22 can look
like this: in a standard image file data can be replaced up to a threshold
without affecting how the image appears to the viewer. Examining the
distribution of tones, however, may indicate certain levels of suspicious
patterns, but this is not a guarantee that something secret or evil has been
embedded; it may be the work of a benign compression algorithm, for example.
Of the methods covered, the least technical from a non-computer science
point of view was the replacement of digital noise, or redundant
information, with a message. Wayner showed illustrations of how he had
written algorithms to perform such tasks for image files. It basically
involves replacing the least significant bit in the bit plane with one that
belongs to the ³hidden² message; i.e if a value of 255 is changed to 254 in
a binary notation the result goes from 11111111 to 11111110, where the last
digit signifies the alteration of data. Without direct references or a
comparative analysis that point to this manipulation, the conundrums of
detection discussed above are obviously haunting any claims about secret
transmissions (for example in relation to the aforementioned video tapes).

Interestingly, researchers looking to embed digital watermarks in
copyrighted content have embraced steganography to turn the copying of
digital files into an ally in their protection schemes. One not-so-secret
message here is that any unauthorized use of images, for example, can be
successfully contested in a court of law, as the steganographic content,
once unveiled, can be submitted as evidence that the offending file is
indeed controlled and owned by the prosecuting party. Uses of the same
science have essentially gone from being banned to becoming highly desirable
once the rights to secrecy are reversed.

An emerging term that borrows from its hacker roots is hacktivism. Broadly
it covers activities that primarily use the Internet, although it arguably
covers technology in any form, to stage demonstrations. Treating cyberspace
as a public arena, activists turned hacktivists seek to engage issues over
the network, just like people have assembled and marched in the streets to
voice their opinions or misgivings. In a presentation entitled ³Digital
Demonstrations: DDoS attack or Cyber Sit-in?,² Maximillian Dornseif offered
a thoughtful and balanced overview of this kind of action. The benefits of
moving protest online, as he presented them, were the increased visibility
of the protest to a larger number of people; the lack of a physical presence
(anyone with the inclination and an Internet connection can take part);
increased anonymity for those involved; and a reduced investment with
regards to time and money. Although ³demonstrators² are not easily counted
online, advertising the actions in advance can compensate for this
shortcoming, and consequently attract hungry-for-novelty media attention to
these new forms of protest. The agenda is inadvertently reported even if the
format feeds the story. Many online demonstrations have already taken place.
Dornseif gave technical beta on how demos have occurred in the past (mainly
through service overloads generated by reloading Web sites repeatedly or
seeking processing that quickly exhausts the system resources), but he
stressed that the future of online protests should take other users into
account and avoid denial of service attacks. The point is to forcefully make
a case, not to damage it. Of the technical scenarios he offered, the
prospects of ³communicating slowly² (as he named the self-explanatory
method) seemed the most promising. By communicating with the server one
character at a time, the system resources are slowed to a painful crawl.
Comparing the plan to one where, for example, office workers ³strike² by
doing their duties in slow motion (the analogy is not applicable to certain
bureaucracies, as time will cease to exist), these protests could be
explained legally within already existing guidelines and in keeping with
more traditional forms of demonstration. Protesters would less likely become
victims of persecution and prosecution as a result.

No hacker conference is of course complete without a set of presentations
dealing with the art and craft of hacking itself. These were usually high on
entertainment value and quite intriguing with regards to the science, but
they were outnumbered by talks addressing social and political issues
concerning the hacker community. A couple of presentations dealing with
computer viruses and the security of wireless networks are worth mentioning
to expose precisely how futile ant-virus software can be and how networking
through 802.11b can, almost, be equated with public broadcasting.

Robert Lupo, with the you-guessed-it handle of Virus, gave a PowerPoint
overview of what viruses are, i.e. self-replicating code that attaches to a
host, and how viruses may be defined, as malicious code that executes on
behalf of the user but without his or her knowledge or approval. The number
of viruses eventually accumulated in this talk and their various methods of
implementation (some spoken of with open admiration) were enough to make any
computer user feel like a hypochondriac. Adding to the earliest virus
discovered in 1981, there are now about 71,000 known viruses (currently
increasing with about 1000 ³official² viruses per year), but only a handful
have reached any kind of notoriety in the wild. Working as an anti-virus
programmer, Lupo reported that the anti-virus companies receive about
400-800 viruses per month that they have to neutralize. The offshoot of all
this is that your anti-virus software always works retroactively; it
provides a cure for an already known virus that rarely remains in
circulation for very long. Or in common cold terms: the epidemic has passed
by the time you have paid for and received your flu shot. Of course, stray
strands may still be around, but the risk of infection is dramatically
reduced. The most advanced anti-virus applications actually update their
protection files continually to reduce the risk of exposure. For common
users, such practices are of course impractical, but they are reflected in
how desktop software is starting to link their applications to servers that
update files of known viruses regularly. As for more drastic improvements,
Lupo discussed software that detects any hostile activity in a system and
alerts the user before it is able to execute. Unlike the applications used
today, this will provide more general security against malicious code. The
best protection of all, however, it to leave the anonymous messages that say
³I love You² or ³How would you like a million dollars?² alone before you
remove them.

As far as hands-on hacking without entry goes, the ³Fun with 802.11b² panel
was a live performance with plenty of part numbers and DIY gadgets. Pointing
a network sniffer in the general direction of Midtown Manhattan, Dragorn,
Porkchop and StAtIc FuSiOn projected the findings behind them as a streaming
backdrop of data packets from hundreds of networks in the area. Only about
half actually encrypted their traffic, and quite incredulously a quarter had
maintained the default factory settings for access (the consequences of
which were not explored but remain clear). Fun and games were also at the
presenting hackers own expense, however, as the sniffer was picking up local
traffic from the conference network and this did, of course, not go
unnoticed for long by the equipped crowd. Soon messages communicating room
numbers for explicit purposes dominated the packets. But somewhere in the
audience someone brilliantly mixed up accepted file path syntax with
language and cleverly pitted it against the crazed paranoia of secrecy,
monitored networks and criminalized hacker activity by forwarding
usr/local/bin/laden. That action appropriately and succinctly sums up HOPE.

_______________________________________________
Nettime-bold mailing list
Nettime-bold@nettime.org
http://amsterdam.nettime.org/cgi-bin/mailman/listinfo/nettime-bold