Updated: 26.11.2002; 11:40:22 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Saturday, November 9, 2002

Privacy questions still loom over biometrics

Biometric technologies have expanded greatly in the past decade, especially following the Sept. 11, 2001, terrorist attacks [FCW: Homeland Security]
23:59 # G!

Hackers claim to have cracked new 'secure' Xbox

Two competing teams of hackers claim to have cracked the new 'secure' Version 2 of the Xbox in under a week.

The teams claim that their modifications opens the door to allow the Xbox to perform a number of tricks that Microsoft and graphics chip designer Nvidia would prefer it didn't.

Team Xecuter say that their device, which they expect to be selling shortly at around $45 will enable modifiers to run alternate operating systems like Linux and play 'homebrew' code as well as imports and code from all regions.

The Xboxhacker BBS was not far behind. The site claims it has been able to 'normalise' an Xbox to run Xbox Linux code.

Although these claims have yet to be tested, it would seem to be a blow to Nvidia who are said to be responsible for the security of the machine. It also means that the hackers have probably bought themselves another six months or so before the developers can come up with a more 'secure' patch.

PC Pro Nov 9 2002 3:43AM ET [moreover Computersecurity]
21:24 # G!

Microsoft refuses to patch major Java vulnerabilities in Explorer

2002/11/08 09:06:02 ET

Microsoft refuses to patch major Java vulnerabilities in Explorer

According to a report by Jouko Pynnonen on the Full Disclosure mailing list, Microsoft has stopped responding to his repeated notes about severe java vulnerabilities in MS Explorer.

As reported earlier Microsoft plans on dropping support for Java which is widely viewed as a slam against rival Sun MIcrosystems and as a tactical move to undermine the java language. [NETSYS.COM]
20:46 # G!

Palladium: The Manhattan Project of DRM

CNET has a good summary of the issues surrounding Palladium and the Trusted Computing Platform Alliance (TCPA). One slightly amusing quote: "I have seen no signs that Microsoft and Intel are out to screw the world; and if they do screw the world, I think Congress will stop them," said the University of Pennsylvania's [David] Farber [of the TCPA]. And if not Congress, then the courts. Oh, wait .. [infoAnarchy]
20:39 # G!

Security software could backfire on consumers

SAN FRANCISCO--At the USENIX Security Conference held here recently, Microsoft developers touted the company's upcoming Palladium architecture as technology that would enhance privacy, stymie piracy and increase a corporation's control over its computers.

Others, however, see a more nefarious role for the security software.

Instead of just keeping hackers out, critics say programs like Palladium could also block computer users from certain data. For example, the technology could be used as a policing mechanism that bars people from material stored on their own computers if they have not met licensing and other requirements.

"The perception is that the security protects content on the user's PC from third parties," said a security consultant who goes by the moniker of Lucky Green. "That's wrong."

The conflict highlights a growing debate over "trusted computers"--machines equipped with the technology to wall off data, secure communications and verify the characteristics of their system. Although military and intelligence agencies have used such systems, the concept has been met with opposition in mainstream consumer markets.

The reason: The masses don't necessarily trust the companies developing "trusted computing" technology. CNET Nov 8 2002 11:43AM ET [moreover Computersecurity]
20:33 # G!

Hi-tech signatures to fight fraud

The UK's biggest building society, the Nationwide, is to introduce electronic signatures to try to prevent fraud.

It is believed to be the first time so-called biometric technology has been rolled out on the High Street in the UK.

Customers will prove their identity by the way they physically sign their name. The system measures the precise speed and direction of the hand as it writes.

Signature capture may not be as well-known as iris or fingerprint recognition, but Nationwide is hopeful it will save it millions of pounds and make a giant step towards a paperless office. [BBC News Online]
20:16 # G!

Heads-up, we're making some changes to the XML-RPC interface for UserLand's aggregator. It's definitely not frozen yet. The implementation is out to the Radio-Dev list, but that's not frozen yet either. Still diggin! [Scripting News]
19:25 #

Accused eBay hacker out on bond

Accused superhacker Jerome Heckenkamp was released from jail last week after seven months in federal stir, but only after assuring two federal judges that he respects their authority after all.

Heckenkamp, 23, was taken into custody last March during a court appearance in San Jose, Calif. where, representing himself against a battery of computer crimes charges, he angered federal judge James Ware with a series of baffling legal arguments apparently inspired by failed tax-protester tactics.

In one gambit, Heckenkamp challenged one the indictment against him on the grounds that it spelled his name in all capital letters, while he spells it with the first letter capitalized, and subsequent letters in lower case.

Seemingly moved into doubting Heckenkamp's commitment to appear at trial, Judge Ware ordered him taken into custody on the spot.

Two months later, from behind bars, Heckenkamp argued in his related San Diego case that he wasn't subject to the jurisdiction of U.S. courts because he had expatriated from "the corporation known as United States" and "re-patrioted into the de-jure California republic." He went on to demand that the plaintiff in the case, the U.S. government, appear in court, and accused prosecutors of fraud or mental incompetence for proceeding without a "client."

The judge in that case, Napoleon Jones, Jr., rejected Heckenkamp's arguments, and assigned him a court-appointed attorney over his objections.

Heckenkamp refused to meet with the panel attorney, but in September apparently gave up on representing himself and hired Los Angeles lawyer Blair Berk -- a decision that promptly reversed his fortune. In a month of filings in both courts, Berk argued that Heckenkamp, who dutifully made all his court appearances before his arrest, would continue to show up if freed again on bail -- regardless of how his name was capitalized.

"Jerome Heckenkamp acknowledges the authority of this court to require him to physically appear or to appear through counsel and answer the charges presently pending before the court," wrote Berk.

Prosecutors didn't oppose his release, and Judge Ware eventually agreed to leave the decision up to Judge Jones, who, after holding a hearing on the matter, set bail at $50,000.

Now free on a signature bond executed by his father, Heckenkamp will live in Los Angeles under house arrest, forbidden to leave home except to attend legal meetings or go to work, or for 90 minutes of exercise a day. By court order he's barred from the Internet, but is permitted to use a single "drone" computer at home to review the electronic evidence in his case, without a modem, and with all the connectors but the mouse, keyboard and power ports covered with police evidence tape. He'll also wear a GPS tracking device, monitored by federal Pre-Trial Services officers.

A former Los Alamos National Labs network engineer, Heckenkamp faces 10 felony charges in his San Diego case for allegedly hacking telecom equipment-maker Qualcomm while a gradate student in 1999. In the San Jose, Calif. case, he's charged with penetrating computers belonging to Lycos, Exodus Communications, Juniper Networks and Cygnus Support Solutions, and defacing online auction site eBay under the hacker handle "MagicFX." That case is on hold pending the conclusion of the San Diego case, in which no trial date is currently set. [The Register]
19:21 # G!

Kaspersky mailing list hijacked!

Oops! Kaspersky Labs' antivirus mailing list became the unwitting vector for the spread of Braid, the latest email worm, today after script kiddies outfoxed the veteran Russian virus fighters.

Recipients to the mailing list looked on in bemusement, and some concern, as the original virus-ladened email generated multiple bounced messages this morning. These echoing messages bounced around the list for eight hours, we're told.

In a statement, Kaspersky Labs admitted the malicious messages was injected into its list after a "massive attack" against the company's Web server last night.

"The attack resulted in a group of hackers sending the subscribers of the Kaspersky Labs' email newsletter a message containing the recently discovered Bridex [Braid] worm," it admits. [The Register]
19:20 # G!

Europeans Outlaw Net Hate Speech

The measure, which bans the publication of material that promotes racism and violence online, clashes directly with U.S. laws protecting such speech. By Julia Scheeres. [Wired News]
18:07 # G!

GAO: Agencies share data despite laws

Technology is making it easier for government agencies to share information, so they are ? including details about your bank accounts, medical complaints and family lives [FCW: Technology]
9:07 # G!

Maximillian Dornseif, 2002.
 
November 2002
Sun Mon Tue Wed Thu Fri Sat
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
Oct   Dec

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.