Updated: 24.11.2002; 17:32:49 Uhr.
lies, laws, legal research, crime and the internet

Tuesday, September 10, 2002

Hacking Trackback into Radio II

My Trackback attempts are continuing. Seems David Watson likes the stuff. He points out Trackback and Radio are a political issue

There are to be several implementations for sending pings (see this tutorial, too). But I want the pings to be send automagically. There is much talk about it but no code/a>.

So I hacked a Python script which connects to radio via the Meta Weblog XML-RPC API, iterates through the latest posts, gets all the liks in each posts, downloads the pages referenced by this links, extracts traceback-RDF information, compares them with if they match the links we were expecting and if so sends out the trachback pings. I will give this thing a test run for one or two more days to be sure it does not break the internet or something like this and then post it here.
23:14 # G!

Mein Sohn ist verloren ...

... wenn er Fisch sieht, sagt er "hmmm, lecker". Seufz.
18:22 # G!

Anruf in Holland.

Wegen Neal-Weh habe ich eben in Holland angerufen. Eigentlich hatte ja meiner Zeit f[florin]r mich, weill Essen angesagt war, aber zwischen den Bissen hatte Neal f[florin]r das eine oder andere Wort Zeit: als ehr "Heimweh" h[ring]rte, hat er das nachgesprochen - obwohl er gar nicht nach Heimweh klang - auch die Nicky identifizierte er korrekt als "Mama" und ans Rose erz...hlte er habe Schrims gegessen wurde auch das nachgesprochen. Im hintergrund rief er immer "nochmal", ich vermute damit war F[florin]tterung gemeint. Und zum Abschied sagte er korrekt "Tsch[florin]§". Wortgewantes Kind.
18:02 # G!

Berman-Coble: an exercise in the cyber-law-definition jungle.

Maybe I should start the freedom to tinker comment weblog. Edward Felten is again poking arround in the Berman-Coble bill inviting me to get back to my favorite rants. Felten now looks Part B of the p2p Definition in the bill, which says somethong like this:

'peer to peer file trading network' means two or more computers which are connected by computer software that--
(A) [is designed to support file sharing]; and
(B) does not permanently route all file or data inquiries or searches through a designated, central computer located in the United States;

Felten argues that no significant centralized system would use a single server but for load balancing reasons a cluster of many machines. He is right, but before talking about this we must find out what constitutes a computer. A single CPU? So a IBM zSeries Machine would be more than a single computer. Processing units in a single Case? No, my Siemens MX-300 comes in two cases. As a working thesis I would define a computer in the context of this bill should be defined as "closely coupeled computing resources under single administrative control". While we might argue if two webservers behind a load balancer are "closely coupeled" stuff like the AIM servers could be subsumed under this term for computer if one really wants to.

Just for the record: This restriction to central servers in the US strange, too. Th US government might create laws which forces citizens of their nation to endure attacks by the RIAA. But they can't to that to foreigeners not on their soil. In fact if the US government encourages private eintities from the US to attack people in other countries, this might be considered an attack carried out by the US government - which might considered as act of war.

Germany should not pick on the US for this: When the german minister for interior affairs realized that he couldn't sue away german Nazi pages on US servers he declared in an interview that this servers should be hacked by german law enforcement to get rid of the Nazi hate pages.
17:07 # G!

Konferenz zu Informationsfreiheit, Kontrolle von Inhalten und Zensur im Internet

Der eco macht mit dem "CCC" die gleiche Konferenz, wie die LfM einen Tag sp...ter. Am Wochenende davor gibt's was ...hnliches von der Naumann Stiftung. Es geht rund im Rheinland!

"IMGccc" Anscheinend hat der Spass keine Webseite, daher hier die Mail:

Liebe eco Interessenten, liebe Mitglieder,

nachfolgend m[ring]chten wir Sie auf eime Veranstaltung des CCC (unter Beteiligung von eco) am 16.09.2002 in D[florin]sseldorf aufmerksam machen. [integral]ber Ihre rege Teilnahme w[florin]rden wir uns freuen!

Konferenz zu Informationsfreiheit, Kontrolle von Inhalten und Zensur im Internet -Eine Veranstaltung des Chaos Computer Club e.V., Montag 16.09.2002 D[florin]sseldorf, Forum im Finanzkaufhaus

10:00 - 10:45 Inhaltliche Kontrolle des Internets [florin]ber das Domain Name System, Referent: Andy M[florin]ller-Maguhn, Sprecher Chaos Computer Club e.V., Benutzergew...hlter Direktor f[florin]r Europa, ICANN, http://www.ccc.de/~andy/

10:45 - 11:30 Insert Coin - Manipulation von Internet-Inhalten als Experiment Alvar Freude, Betreiber ODEM.ORG http://www.odem.org/ 11:30 - 11:45 Kaffeepause 11:45 - 12:15 (working title), Internetfreedom in France after the "yahoo" court decision, Meryem Marzouki http://asim.lip6.fr/~marzouki/perso/index.gb.html

12:15 - 13:00 Internet-Zensur in Nordrhein-Westf...len, B[ring]ssow gef...hrdet die Informationssph...re (Arbeitstitel), Referenten: Jens Ohlig, Sprecher Chaos Computer Club e.V, Lars Weiler, Chaosdorf D[florin]sseldorf e.V. http://www.ccc.de/censorship/

13:15 - 14:30 Mittagspause, (gesondert angek[florin]ndigt: Pressekonferenz um 13:30 - 13:50)

14:30 - 15:15 Die Internet-Zensur in NRW aus Providersicht, Referenten: Harald A. Summa, eco Forum e.V. , http://www.eco.de/ , sowie vorr. ein Vertreter eines betroffenen ISP

15:15 - 15:30 Kaffeepause

15:30 - 16:15 Verpflichtet die deutsche Gestzeslage Internet-Service Provider, inhaltliche Angebote des Netzes zu sperren? Europ...ische Rechtsanw...ltin Dr. Irini E. Vassilaki, Universit...t G[ring]ttingen

16:15 - 16:30 Kaffeepause

16:30 - 17:00 Gesellschaftlicher Umgang mit extremen Inhalten im, Internet , Prof. Dr. Thomas Hoeren, Harald A. Summa, Irini Vassilaki, Andy M[florin]ller-Maguhn

ca. 17:00 Ende der Veranstaltung

Die Veranstaltung findet statt im Forum im Finanzkaufhauses D[florin]sseldorf, Bilker Alle (Hausnummer befindet sich noch in der Ermittlung)

Eine Anfahrtsbeschreibung gibt es unter http://www.forum-duesseldorf.com/forum_duesseldorf_anfahrt.htm

Mit freundlichen Gr[florin]§en ...
16:01 # G! Translate

unmask: identifying the authors of anonymous texts

immunitysec: unmask. Immunitysec.com has released Unmask, a script that claims to help identify the authors of anonymous texts, using statistical analysis to record signatures. It's released under the GPL.

Unmask is a python script that allows you to break the anonymity of e-mail or other text. It works by doing basic statistical matching against stored "signatures." It may require some tweaking to fit your particular use to it (un-anonymizing IRC chats, email, web pages on FreeNet,... [bplog]
14:23 # G!

25-year jail terms for terror?

A proposed new Victorian law seeks to impose increased jail terms for acts of sabotage, including "cyber crime". The legislation is not yet available for review. The Government is planning to introduce new legislation in State Parliament this week under the Crimes (Property Damage and Computer Offences) Bill. [...]

The laws are likely to receive bipartisan support and will give specific powers to prevent cyber crime, such as hacking into the police computer network.... [bplog]
14:22 # G!

4.-6.10: Hackmeeting in Madrid

8:02 # G!

Digital Demonstrations again.

Hacktivism.ca has a snippet on my "H2K2" presentation "on virtual sit-ins" and a link to an article "What is the Borderline Between Criminality and Civil Disobedience in the Net?" by Marco Cappato (MEP) who is pushing the EU to be careful not to criminalize creative political expression on the Internet. See also his report on the subject.
7:52 # G!

Philippines cracks phone hacking ring

MANILA (Reuters) - The Philippines said on Monday it had cracked a 100 million peso ($1.9 million) computer hacking ring that had gained access to telephone company lines and sold off cheap phone calls.

The hacking ring was cracked after the country's main phone company, Philippine Long Distance Telephone Co, asked for help to stop the scam, police said. The hackers tapped into computers controlling long-distance phone calls, then sold calls to their clients at prices around half the normal rate.

Immigration officials said two of those arrested were Jordanians and the third was a Filipino. The ring had amassed about 100 million pesos from their hacking operations since last year. If convicted, those arrested face up to six years in jail and a fine of up to 100,000 pesos ($1,923) each.[Moreover - moreover...]
7:29 # G!

Disgruntled CISSP flunky accused of SPAM campaign against (ISC)2

(ISC)2 is working with federal and state law enforcement authorities on the case. The consortium's own investigation has led to a suspect who recently failed the CISSP exam and then physically threatened the proctors if they didn't grant his credentials. While he declined to identify the suspect, Johnston says the person lives in an English-speaking country that will cooperate in his prosecution and, if warranted, extradition. Johnston, who doubles as (ISC)2's CISO, says they initially couldn't pinpoint where the spam was coming from, but were eventually able to determine that the suspect was using a spam server in China. (ISC)2 says its membership lists and network weren't compromised by the spammer. Most of the messages are being sent to people who have never heard of the accreditation consortium, the group says. [Security News Portal]
7:23 # G!

Hacking Trackback into Radio I

I want trackback. I want it transparent and I want it now. Seems I have to do it myself.

First I want to accept incomming trackback 'pings'. Installing standalone trackback on md.hudora.de ig no problem. Now get trackback links under my Radio items.

I dropped a extremly quick and dirty thing named trackBack.txt in my Macros folder and added < %trackBack(< %itemNum% >)% > in #itemTemplate.txt. That's it. Get the trackBack Script and modify the URLs to suit your server:

on trackBack(postid, trackbackUrl = "http://md.hudora.de/cgi-bin/tb.cgi") { 
        local (adrblog = radio.weblog.init ()); 
        local (adrpost = @adrblog^.posts.[string.padwithzeros (postid, 8)]); 
        local(permaLink = "http://radio.weblogs.com/0112292/"); 
        try {radio.weblog.getUrlForPost (adrpost, @permaLink, adrdata:adrblog)}; 
        if defined (adrpost^.title) { 
                local(ptitle = string (adrpost^.title))} 
        else {                               
                local(ptitle = "")}; 
        return ("<a href=\"" + trackbackUrl + "?__mode=list&tb_id=" + postId +"" onclick="window.open(this.
href, 'trackback', 'width=480,height=480,scrollbars=yes,status=yes'); return false">TrackBack</a>n<!-- <rdf
:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"\nxmlns:dc="http://purl.org/dc/elements/1.1/"
>n<rdf:Description about="" + trackbackUrl + "?tb_id=" + postId + "\"ndc:title="" + ptitle + "\" 
dc:identifier="" + permaLink+ "\" /></rdf:RDF> -->")}

Tomorrow: how to use Radio, Python, XML-RPC and some hacking to send trackback pings from your Radio Weblog without user intervention.
0:27 # G!

Maximillian Dornseif, 2002.
September 2002
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Aug   Oct


Subsections of this WebLog

Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.