SlideShare a Scribd company logo
hacker identity
Ex-hacker
                              'Mafiaboy' tells all
                              in memoir
     Hacker history           A former hacker, who temporarily shut down

                              several major websites and led the RCMP and

                              the FBI on a manhunt when he was 15, has


ā€¢Formed by a combination      written a tell-all memoir about his criminal past.
of punk and cybnetic sci-ļ¬
writers                       Michael Calce co-wrote with journalist Craig


ā€¢common themes were           Silverman Mafiaboy: How I Cracked the Internet

disillusionment and/or        and Why It's Still Broken, which tells his story
sense of detachment from
dominant social groups,       and examines the current state of online

rebellion, aggression         security.


ā€¢birth of new com-            In February 2000, Calce, who went by the
munities that recognized
the gap between reality and   internet alias Mafiaboy, launched denial-of-

public awareness              service attacks that temporarily brought down


ā€¢freedom of information       five websites, including Yahoo!, eBay and CNN.

and self-empowerment          The attacks caused millions of dollars in

                              damages and shook the confidence of the U.S.

                              government. Former U.S. president Bill Clinton
DONā€™T TRUST
ANYONE OVER 25
I believe that we live in an era where anything
 that can be expressed as bits will be. I believe
that bits exist to be copied [. . .]. Me, Iā€™m looking
to ļ¬nd ways to use copying to make more money
    and itā€™s working: enlisting my readers as
  evangelists for my work and giving them free
  ebooks to distribute sells more books. As Tim
    Oā€™Reilly says, my problem isnā€™t piracy, itā€™s
                    obscurity.
             ā€” Cory Doctorow (ā€œAboutā€)
Tim Wu is a professor at Columbia Law School, the chair of media
   reform group Free Press, and a writer for Slate Magazine.
HACK series by tim oā€™reilly

The "Hacks" series says it "reclaims the term 'hacking'
   for the good guys--innovators who explore and
experiment, unearth shortcuts, create useful tools,
  and come up with fun things to try on their own."

                              http://video.google.com/videoplay?
                                  docid=6272710823098922710#


                  http://articles.latimes.com/2008/oct/10/business/ļ¬-oreilly10
The most alarming aspect of the DCMA for hackers is that it
embodies the fallacy that the only sources of innovation of the beneļ¬t
to society lie within the halls of research institutions or corporations.
 Suddenly, it is a crime to explore, in the comfort of your own home.

  Freedom of speech should not require a lawyer, and free thought
      should not involve letters of authorization for research.


                                           Andrew ā€œbunnieā€ Huang,
                                            Hacking the Xbox
For every copyright protection scheme that is
  defeated by a hacker, there is someone who
learned an important lesson about how to make
          a better protection scheme.

                             Andrew ā€œbunnieā€ Huang,
                              Hacking the Xbox
The keys to decrypt a DVD are controlled by an org called DVD-
CCA, and they have a bunch of licensing requirements for anyone
   who gets a key from them. Among these is something called
region-coding: if you buy a DVD in France, it'll have a ļ¬‚ag set that
  says, "I am a European DVD." Bring that DVD to America and
   your DVD player will compare the ļ¬‚ag to its list of permitted
    regions, and if they don't match, it will tell you that it's not
 allowed to play your disc. Remember: there is no copyright that
 says that an author gets to do this. When we wrote the copyright
     statutes and granted authors the right to control display,
performance, duplication,derivative works, and so forth, we didn't
     leave out "geography"by accident. That was on-purpose.
So when your French DVD won't play in America, that's not because it'd be
illegal to do so: it's because the studios have invented a business-model and
 then invented a copyright law to prop it up. The DVD is your property and
so is the DVD player, but if you break the region-coding on your disc, you're
     going to run afoul of anticircumvention. That's what happened to Jon
 Johansen, a Norwegian teenager who wanted to watch French DVDs on his
Norwegian DVD player. He and some pals wrote some code to break the CSS
  so that he could do so. He's a wanted man here in America; in Norway the
  studios put the local fuzz up to bringing him up on charges of ā€œunlawfully
    trespassing upon a computer system.ā€ When his defence asked,"Which
 computer has Jon trespassed upon?" the answer was: "His own." (Microsoft
                               Research DRM talk.)
This is the overweening characteristic of every single successful
new medium: it is true to itself. The Luther Bible didn't succeed
on the axes that made a hand-copied monk Bible valuable: they
were ugly, they weren't in Church Latin, they weren't read
aloud by someone who could interpret it for his lay audience,
they didn't represent years of devoted-with-a-capital-D labor by
someone who had given his life over to God. The thing that
made the Luther Bible a success was its scalability: it was more
popular because it was more proliferate: all success factors for a
new medium pale beside its proļ¬‚igacy. The most successful
organisms on earth are those that reproduce the most: bugs and
bacteria, nematodes and virii. Reproduction is the best of all
survival strategies.

http://craphound.com/msftdrm.txt
digital rights Management

    Doctorowā€™s Microsoft Research DRM Talk
    is his most famous position paper on DRM.
    http://craphound.com/msftdrm.txt




  Here's how anticircumvention works: if you put a lock -- an access control -- around a
copyrighted work, it is illegal to break that lock. It's illegal to make a tool that breaks that
lock. It's illegal to tell someone how to make that tool. One court even held it illegal to tell
                     someone where she can ļ¬nd out how to make that tool.
Here are the two most important things to know about computers
                         and the Internet:

           1. A computer is a machine for rearranging bits

   2. The Internet is a machine for moving bits from one place to
                 another very cheaply and quickly.

Any new medium that takes hold on the Internet and with
computers will embrace these two facts, not regret them. A
newspaper press is a machine for spitting out cheap and smeary
newsprint at speed: if you try to make it output ļ¬ne art lithos, you'll
get junk. If you try to make it output newspapers, you'll get the
basis for a free society. And so it is with the Internet. At the heyday
of Napster, record execs used to show up at conferences and tell
everyone that Napster was doomed because no one wanted loosely
compressed MP3s with no liner notes and truncated ļ¬les and
misspelled metadata.

               (http://craphound.com/msftdrm.txt)
digital rights Management

ā€¢   DRM is a mechanism for unbalancing copyright, for betraying the statutory limitations on copyright, for
    undermining the law itself. By granting rightsholders the ability to unilaterally conļ¬scate public rights
    under copyright, DRM takes value out of the public's pocket and delivers it to rightsholders. ( Cory
    Doctorow, DRM Talk for Hewlett-Packard Research Corvalis, Oregon


ā€¢   The Darknet Paper: Microsoft employees write a position paper that argues against watermarking and
    DRM (in opposition to company policy) . Got public attention b/c it suggested illicit activity and criminal
    mindset. Also suggested a divide btwn the legitimate Internet and the ā€œundergroundā€ Net. The difference
    is technology rather than content, encryption for whatever purpose, legal or illegal.


ā€¢   ā€œThe paper makes a three-part argument. First, there is really no way to stop ļ¬le sharing, as long as
    people want to share ļ¬les. Second, in the presence of widespread ļ¬le sharing, a copy-prevention
    technology must be perfect, for the presence in a ļ¬le sharing environment of even a single un-contained
    copy of a work enables anyone who wants to infringe its copyright to do so. (This is what I call the
    "break once, infringe anywhere" model.) Finally, there is little if any hope that a copy-prevention (or
    "DRM") technology can be strong enough to prevent the creation of single un-contained copies of works.
    So the conclusion is that the current DRM approach will not work.ā€         Freedom to Tinker Blog Ed
    Felten - Posted on November 25th, 2002
ā€¢ Doctorowā€™s Xnet is taken from the Darknet
  concept

ā€¢ Darknet is any closed private network of
  computers used for ļ¬le sharing
ā€¢ donā€™t learn to hack - hack to learn
CRYPTOGRAPHY




Modern industrial cryptography consists of three crucial components: ļ¬rst, a "cipher" - a system for scrambling messages. These are always public
   and never secret or proprietary. Banks, spies, retailers, child pornographers and your web browser all use the same basic set of ciphers. That's
   because the only way to prove that a cipher works is to expose it to public scrutiny and see if any clever bastard can spot a ļ¬‚aw in it.It's a little
 counterintuitive to think of full disclosure as a prerequisite for security, but it is a basic tenet of cryptography ā€“ and it has been so ever since Alan
   Turing and the lads at Bletchley Park broke the Nazi ciphers and spent the rest of the war reading Hitler's secret dispatches and snickering to
                                                                       themselves.
 Second, there is a "ciphertext" - a blob of data that has been encrypted with the cipher.Finally, and crucially, there's the "key". This is a very small
piece of information - usually less than 1000 characters - that is kept secret from all but the legitimate senders and receivers of the information. The
                                 key is the secret bit of information that the cipher uses to unscramble the ciphertext.
  As a system, it works brilliantly. You can download an email privacy program that uses standard, public encryption algorithms to scramble your
  email so that only its intended recipients can read them. You know that messages can only be read by the authorised sender and the authorised
                                            receiver because you are the only ones who know have the key.
Privacy almost always includes an element of personal/
                   political power.

             Children want privacy from their parents.

            Employees want privacy from their bosses.

Political dissidents want privacy from the Chinese secret police.

                                DRM Talk for Hewlett-Packard Research
       Corvalis, OregonCory Doctorow European Affairs Coordinator, Electronic Frontier Foundation
where digital rights Management
    and cryptography meet
   In DRM use-restriction scenarios, there is
 only a sender and an attacker, who is also the
 intended recipient of the message. I transmit a
song to you so that you can listen to it, but try   FOR EXAMPLE: Amazon's new movie download service
                                                    is called Unbox and it outlines what DRM implies. The
to stop you from copying it. This requires that     user agreement requires that you allow Unbox DRM
your terminal obey my commands, even when           software to monitor your hard drive and to report
      you want it to obey your commands.            activity to Amazon. These reports would thus include a
                                                    list of: all the software installed; all the music and
    Understood this way, use-restriction and        video you have; all your computer's interaction with
privacy are antithetical. As is often the case in   other devices. You will surrender your freedom to such
  security, increasing the security on one axis     an extent that you will only be able to regain control
                                                    by removing the software. But if you do remove the
 weakens the security on another. A terminal        software you will also remove all your movies along
  that is capable of being remotely controlled      with it. You are restricted even geographically, and you
    by a third party who is adversarial to its      lose your movies if you ever move out of the USA. You
                                                    of course have to agree that they can change these
     owner is a terminal that is capable of         terms at any time. Microsoft's newly upgraded
   betraying its owner's privacy in numerous        Windows Media Player 11 (WMP11) user agreement has
      ways without the owner's consent or           a similar set of terms.
knowledge. A terminal that can never be used        (http://www.defectivebydesign.org/what_is_drm)
to override its owner's wishes is by deļ¬nition
    a terminal that is better at protecting its
                 owner's privacy.
doctorow on crypto
In DRM, the attacker is also the recipient. It's not Alice andBob and Carol, it's
just Alice and Bob. Alice sells Bob a DVD. She sells Bob a DVD player. The
DVD has a movie on it -- say,Pirates of the Caribbean -- and it's enciphered
with an algorithm called CSS -- Content Scrambling System. The DVD
player has a CSS un-scrambler.Now, let's take stock of what's a secret here:
the cipher is well-known. The cipher-text is most assuredly in enemy hands,
arrr...So what? As long as the key is secret from the attacker, we're golden.
But there's the rub. Alice wants Bob to buy Pirates of the Caribbean from her.
Bob will only buy Pirates of the Caribbean if he can descramble the CSS-
encrypted VOB -- video object -- on his DVD player. Otherwise, the disc is
only useful to Bob as a drinks-coaster. So Alice has to provide Bob -- the
attacker -- with the key, the cipher and the cipher-text. DRM systems are
usually broken in minutes, sometimes days. Rarely, months. It's not because
the people who think them up are stupid. It's not because the people who
break them are smart. It's not because there's a ļ¬‚aw in the algorithms. At the
end of the day, all DRM systems share a common vulnerability: they provide
their attackers with cipher-text, the cipher and the key. At this point, the
secret isn't a secret anymore.
What type of info/work/code can be copyright?
  Where is it freedom and where is it protection?

InterNet new medium - must change business model

  Cryptography - how do we catch the bad guys?
Literature
     or
 manifesto?
Does Little Brother
 aim to entertain us,
teach us, or convince
         us?

how well does it do any
   of these things?
If you love freedom, if you think the human
condition is dignified by privacy, by the right to be
left alone, by the right to explore your weird ideas
provided you don't hurt others, then you have
common cause with the kids whose web-browsers
and cellphones are being used to lock them up and
follow them around.

If you believe that the answer to bad speech is
more speech not censorship then you have a dog
in the fight. If you believe in a society of laws, a
land where our rulers have to tell us the rules, and
have to follow them too, then you're part of the
same struggle that kids fight when they argue for
DO SOMETHING

 This book is meant to be something you do, not just something
you read. The technology in this book is either real or nearly real.
You can build a lot of it. You can share it and remix it . You can
use the ideas to spark important discussions with your friends
and family. You can use those ideas to defeat censorship and get
onto the free Internet, even if your government, employer or
ā€œI believe that totalitarian ideas have taken root in the minds
 of intellectuals everywhere, and I have tried to draw these
            ideas out to their logical consequences.ā€
       (Orwell, The Collected Essays, Journalism, and Letters of
                                                 George Orwell)




    ā€œā€¦nationalism, religious bigotry, and feudal
loyalty are far more powerful forces than sanity.ā€
    (Orwell, Wells, Hitler, and the World State)
The scene of the book is laid in
 Britain in order to emphasize
that the English-speaking races
  are not innately better than
      anyone else and that
 totalitarianism, if not fought
     against, could triumph
            anywhere.
 (Orwell, Collected Essays, Journalism,
     and Letters of George Orwell)
I do not believe that the
     kind of society I
  describe will arrive,
  (the book is a satire),
   but that something
   resembling it could
          arrive.
http://craphound.com/littlebrother/2010/07/10/iranian-
activists-release-free-persian-little-brother/
More
RESOURCES
    http://www.guardian.co.uk/
technology/2007/sep/04/lightspeed

 http://craphound.com/hpdrm.txt

http://craphound.com/msftdrm.txt

    http://www.boingboing.net/
  2009/04/15/my-drm-and-ebooks-
             ta.html

More Related Content

What's hot

Presentacion informacion sobre el internet
Presentacion informacion sobre el internetPresentacion informacion sobre el internet
Presentacion informacion sobre el internet
verohamed
Ā 
2600 v25 n4 (winter 2008)
2600 v25 n4 (winter 2008)2600 v25 n4 (winter 2008)
2600 v25 n4 (winter 2008)
Felipe Prado
Ā 
SOPA
SOPASOPA
SOPAgabe075
Ā 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
Jerric Lyns John
Ā 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundance
glynmoody
Ā 
Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6
Siegmeyer
Ā 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette OnlineDouglas Strahler
Ā 
Setting a Precedent with Open Resources Development in English for Specific A...
Setting a Precedent with Open Resources Development in English for Specific A...Setting a Precedent with Open Resources Development in English for Specific A...
Setting a Precedent with Open Resources Development in English for Specific A...
Alannah Fitzgerald
Ā 
The new internet part i
The new internet part   iThe new internet part   i
The new internet part i
thenewinternet02
Ā 
Darknet
DarknetDarknet
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
lilianedwards
Ā 
nghe thuat lua dao
nghe thuat lua daonghe thuat lua dao
nghe thuat lua daoHung Pham Thai
Ā 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSecPositive Hack Days
Ā 
Tom Armitage: Den materielle verden (Webdagene 2013)
Tom Armitage: Den materielle verden (Webdagene 2013)Tom Armitage: Den materielle verden (Webdagene 2013)
Tom Armitage: Den materielle verden (Webdagene 2013)webdagene
Ā 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Felipe Prado
Ā 
The 21st Century Kid
The 21st Century KidThe 21st Century Kid
The 21st Century Kid
Joquetta Johnson
Ā 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
Felipe Prado
Ā 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
wstagnaro
Ā 

What's hot (19)

Presentacion informacion sobre el internet
Presentacion informacion sobre el internetPresentacion informacion sobre el internet
Presentacion informacion sobre el internet
Ā 
2600 v25 n4 (winter 2008)
2600 v25 n4 (winter 2008)2600 v25 n4 (winter 2008)
2600 v25 n4 (winter 2008)
Ā 
SOPA
SOPASOPA
SOPA
Ā 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
Ā 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundance
Ā 
Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6
Ā 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
Ā 
Setting a Precedent with Open Resources Development in English for Specific A...
Setting a Precedent with Open Resources Development in English for Specific A...Setting a Precedent with Open Resources Development in English for Specific A...
Setting a Precedent with Open Resources Development in English for Specific A...
Ā 
The new internet part i
The new internet part   iThe new internet part   i
The new internet part i
Ā 
Darknet
DarknetDarknet
Darknet
Ā 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
Ā 
nghe thuat lua dao
nghe thuat lua daonghe thuat lua dao
nghe thuat lua dao
Ā 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
Ā 
Tom Armitage: Den materielle verden (Webdagene 2013)
Tom Armitage: Den materielle verden (Webdagene 2013)Tom Armitage: Den materielle verden (Webdagene 2013)
Tom Armitage: Den materielle verden (Webdagene 2013)
Ā 
BigBrother
BigBrotherBigBrother
BigBrother
Ā 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Ā 
The 21st Century Kid
The 21st Century KidThe 21st Century Kid
The 21st Century Kid
Ā 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
Ā 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Ā 

Similar to Drm and crypto

Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
Ā 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
Ā 
Powerpoint
PowerpointPowerpoint
Powerpoint
Marcelomazzocato
Ā 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )Elipeta Sotabento
Ā 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
Ā 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
Ā 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Sharique Masood
Ā 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
Ā 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
Ā 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
Rob Jewitt
Ā 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma
Ā 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ashish Chandurkar
Ā 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
Felipe Prado
Ā 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
rkpv2002
Ā 
Piracy
PiracyPiracy
Software piracy
Software piracySoftware piracy
Software piracy
Ti-Sun
Ā 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
Ā 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
shericehewat
Ā 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ANKITA VISHWAKARMA
Ā 

Similar to Drm and crypto (20)

Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
Ā 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Ā 
Powerpoint
PowerpointPowerpoint
Powerpoint
Ā 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
Ā 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Ā 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
Ā 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Ā 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
Ā 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
Ā 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
Ā 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Ā 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
Ā 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
Ā 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
Ā 
Piracy
PiracyPiracy
Piracy
Ā 
Software piracy
Software piracySoftware piracy
Software piracy
Ā 
Hacking
HackingHacking
Hacking
Ā 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
Ā 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
Ā 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ā 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
Ā 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
Ā 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
Ā 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
Ā 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
Ā 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
Ā 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
Ā 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
Ā 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
Ā 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
Ā 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
Ā 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
Ā 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
Ā 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
Ā 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
Ā 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
Ā 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
Ā 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
Ā 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
Ā 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
Ā 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Ā 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Ā 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
Ā 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
Ā 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Ā 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Ā 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ā 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Ā 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Ā 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Ā 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Ā 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Ā 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Ā 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Ā 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Ā 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
Ā 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Ā 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
Ā 

Drm and crypto

  • 2. Ex-hacker 'Mafiaboy' tells all in memoir Hacker history A former hacker, who temporarily shut down several major websites and led the RCMP and the FBI on a manhunt when he was 15, has ā€¢Formed by a combination written a tell-all memoir about his criminal past. of punk and cybnetic sci-ļ¬ writers Michael Calce co-wrote with journalist Craig ā€¢common themes were Silverman Mafiaboy: How I Cracked the Internet disillusionment and/or and Why It's Still Broken, which tells his story sense of detachment from dominant social groups, and examines the current state of online rebellion, aggression security. ā€¢birth of new com- In February 2000, Calce, who went by the munities that recognized the gap between reality and internet alias Mafiaboy, launched denial-of- public awareness service attacks that temporarily brought down ā€¢freedom of information five websites, including Yahoo!, eBay and CNN. and self-empowerment The attacks caused millions of dollars in damages and shook the confidence of the U.S. government. Former U.S. president Bill Clinton
  • 4. I believe that we live in an era where anything that can be expressed as bits will be. I believe that bits exist to be copied [. . .]. Me, Iā€™m looking to ļ¬nd ways to use copying to make more money and itā€™s working: enlisting my readers as evangelists for my work and giving them free ebooks to distribute sells more books. As Tim Oā€™Reilly says, my problem isnā€™t piracy, itā€™s obscurity. ā€” Cory Doctorow (ā€œAboutā€)
  • 5. Tim Wu is a professor at Columbia Law School, the chair of media reform group Free Press, and a writer for Slate Magazine.
  • 6. HACK series by tim oā€™reilly The "Hacks" series says it "reclaims the term 'hacking' for the good guys--innovators who explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on their own." http://video.google.com/videoplay? docid=6272710823098922710# http://articles.latimes.com/2008/oct/10/business/ļ¬-oreilly10
  • 7. The most alarming aspect of the DCMA for hackers is that it embodies the fallacy that the only sources of innovation of the beneļ¬t to society lie within the halls of research institutions or corporations. Suddenly, it is a crime to explore, in the comfort of your own home. Freedom of speech should not require a lawyer, and free thought should not involve letters of authorization for research. Andrew ā€œbunnieā€ Huang, Hacking the Xbox
  • 8. For every copyright protection scheme that is defeated by a hacker, there is someone who learned an important lesson about how to make a better protection scheme. Andrew ā€œbunnieā€ Huang, Hacking the Xbox
  • 9. The keys to decrypt a DVD are controlled by an org called DVD- CCA, and they have a bunch of licensing requirements for anyone who gets a key from them. Among these is something called region-coding: if you buy a DVD in France, it'll have a ļ¬‚ag set that says, "I am a European DVD." Bring that DVD to America and your DVD player will compare the ļ¬‚ag to its list of permitted regions, and if they don't match, it will tell you that it's not allowed to play your disc. Remember: there is no copyright that says that an author gets to do this. When we wrote the copyright statutes and granted authors the right to control display, performance, duplication,derivative works, and so forth, we didn't leave out "geography"by accident. That was on-purpose.
  • 10. So when your French DVD won't play in America, that's not because it'd be illegal to do so: it's because the studios have invented a business-model and then invented a copyright law to prop it up. The DVD is your property and so is the DVD player, but if you break the region-coding on your disc, you're going to run afoul of anticircumvention. That's what happened to Jon Johansen, a Norwegian teenager who wanted to watch French DVDs on his Norwegian DVD player. He and some pals wrote some code to break the CSS so that he could do so. He's a wanted man here in America; in Norway the studios put the local fuzz up to bringing him up on charges of ā€œunlawfully trespassing upon a computer system.ā€ When his defence asked,"Which computer has Jon trespassed upon?" the answer was: "His own." (Microsoft Research DRM talk.)
  • 11. This is the overweening characteristic of every single successful new medium: it is true to itself. The Luther Bible didn't succeed on the axes that made a hand-copied monk Bible valuable: they were ugly, they weren't in Church Latin, they weren't read aloud by someone who could interpret it for his lay audience, they didn't represent years of devoted-with-a-capital-D labor by someone who had given his life over to God. The thing that made the Luther Bible a success was its scalability: it was more popular because it was more proliferate: all success factors for a new medium pale beside its proļ¬‚igacy. The most successful organisms on earth are those that reproduce the most: bugs and bacteria, nematodes and virii. Reproduction is the best of all survival strategies. http://craphound.com/msftdrm.txt
  • 12. digital rights Management Doctorowā€™s Microsoft Research DRM Talk is his most famous position paper on DRM. http://craphound.com/msftdrm.txt Here's how anticircumvention works: if you put a lock -- an access control -- around a copyrighted work, it is illegal to break that lock. It's illegal to make a tool that breaks that lock. It's illegal to tell someone how to make that tool. One court even held it illegal to tell someone where she can ļ¬nd out how to make that tool.
  • 13. Here are the two most important things to know about computers and the Internet: 1. A computer is a machine for rearranging bits 2. The Internet is a machine for moving bits from one place to another very cheaply and quickly. Any new medium that takes hold on the Internet and with computers will embrace these two facts, not regret them. A newspaper press is a machine for spitting out cheap and smeary newsprint at speed: if you try to make it output ļ¬ne art lithos, you'll get junk. If you try to make it output newspapers, you'll get the basis for a free society. And so it is with the Internet. At the heyday of Napster, record execs used to show up at conferences and tell everyone that Napster was doomed because no one wanted loosely compressed MP3s with no liner notes and truncated ļ¬les and misspelled metadata. (http://craphound.com/msftdrm.txt)
  • 14. digital rights Management ā€¢ DRM is a mechanism for unbalancing copyright, for betraying the statutory limitations on copyright, for undermining the law itself. By granting rightsholders the ability to unilaterally conļ¬scate public rights under copyright, DRM takes value out of the public's pocket and delivers it to rightsholders. ( Cory Doctorow, DRM Talk for Hewlett-Packard Research Corvalis, Oregon ā€¢ The Darknet Paper: Microsoft employees write a position paper that argues against watermarking and DRM (in opposition to company policy) . Got public attention b/c it suggested illicit activity and criminal mindset. Also suggested a divide btwn the legitimate Internet and the ā€œundergroundā€ Net. The difference is technology rather than content, encryption for whatever purpose, legal or illegal. ā€¢ ā€œThe paper makes a three-part argument. First, there is really no way to stop ļ¬le sharing, as long as people want to share ļ¬les. Second, in the presence of widespread ļ¬le sharing, a copy-prevention technology must be perfect, for the presence in a ļ¬le sharing environment of even a single un-contained copy of a work enables anyone who wants to infringe its copyright to do so. (This is what I call the "break once, infringe anywhere" model.) Finally, there is little if any hope that a copy-prevention (or "DRM") technology can be strong enough to prevent the creation of single un-contained copies of works. So the conclusion is that the current DRM approach will not work.ā€ Freedom to Tinker Blog Ed Felten - Posted on November 25th, 2002
  • 15. ā€¢ Doctorowā€™s Xnet is taken from the Darknet concept ā€¢ Darknet is any closed private network of computers used for ļ¬le sharing ā€¢ donā€™t learn to hack - hack to learn
  • 16. CRYPTOGRAPHY Modern industrial cryptography consists of three crucial components: ļ¬rst, a "cipher" - a system for scrambling messages. These are always public and never secret or proprietary. Banks, spies, retailers, child pornographers and your web browser all use the same basic set of ciphers. That's because the only way to prove that a cipher works is to expose it to public scrutiny and see if any clever bastard can spot a ļ¬‚aw in it.It's a little counterintuitive to think of full disclosure as a prerequisite for security, but it is a basic tenet of cryptography ā€“ and it has been so ever since Alan Turing and the lads at Bletchley Park broke the Nazi ciphers and spent the rest of the war reading Hitler's secret dispatches and snickering to themselves. Second, there is a "ciphertext" - a blob of data that has been encrypted with the cipher.Finally, and crucially, there's the "key". This is a very small piece of information - usually less than 1000 characters - that is kept secret from all but the legitimate senders and receivers of the information. The key is the secret bit of information that the cipher uses to unscramble the ciphertext. As a system, it works brilliantly. You can download an email privacy program that uses standard, public encryption algorithms to scramble your email so that only its intended recipients can read them. You know that messages can only be read by the authorised sender and the authorised receiver because you are the only ones who know have the key.
  • 17. Privacy almost always includes an element of personal/ political power. Children want privacy from their parents. Employees want privacy from their bosses. Political dissidents want privacy from the Chinese secret police. DRM Talk for Hewlett-Packard Research Corvalis, OregonCory Doctorow European Affairs Coordinator, Electronic Frontier Foundation
  • 18. where digital rights Management and cryptography meet In DRM use-restriction scenarios, there is only a sender and an attacker, who is also the intended recipient of the message. I transmit a song to you so that you can listen to it, but try FOR EXAMPLE: Amazon's new movie download service is called Unbox and it outlines what DRM implies. The to stop you from copying it. This requires that user agreement requires that you allow Unbox DRM your terminal obey my commands, even when software to monitor your hard drive and to report you want it to obey your commands. activity to Amazon. These reports would thus include a list of: all the software installed; all the music and Understood this way, use-restriction and video you have; all your computer's interaction with privacy are antithetical. As is often the case in other devices. You will surrender your freedom to such security, increasing the security on one axis an extent that you will only be able to regain control by removing the software. But if you do remove the weakens the security on another. A terminal software you will also remove all your movies along that is capable of being remotely controlled with it. You are restricted even geographically, and you by a third party who is adversarial to its lose your movies if you ever move out of the USA. You of course have to agree that they can change these owner is a terminal that is capable of terms at any time. Microsoft's newly upgraded betraying its owner's privacy in numerous Windows Media Player 11 (WMP11) user agreement has ways without the owner's consent or a similar set of terms. knowledge. A terminal that can never be used (http://www.defectivebydesign.org/what_is_drm) to override its owner's wishes is by deļ¬nition a terminal that is better at protecting its owner's privacy.
  • 19. doctorow on crypto In DRM, the attacker is also the recipient. It's not Alice andBob and Carol, it's just Alice and Bob. Alice sells Bob a DVD. She sells Bob a DVD player. The DVD has a movie on it -- say,Pirates of the Caribbean -- and it's enciphered with an algorithm called CSS -- Content Scrambling System. The DVD player has a CSS un-scrambler.Now, let's take stock of what's a secret here: the cipher is well-known. The cipher-text is most assuredly in enemy hands, arrr...So what? As long as the key is secret from the attacker, we're golden. But there's the rub. Alice wants Bob to buy Pirates of the Caribbean from her. Bob will only buy Pirates of the Caribbean if he can descramble the CSS- encrypted VOB -- video object -- on his DVD player. Otherwise, the disc is only useful to Bob as a drinks-coaster. So Alice has to provide Bob -- the attacker -- with the key, the cipher and the cipher-text. DRM systems are usually broken in minutes, sometimes days. Rarely, months. It's not because the people who think them up are stupid. It's not because the people who break them are smart. It's not because there's a ļ¬‚aw in the algorithms. At the end of the day, all DRM systems share a common vulnerability: they provide their attackers with cipher-text, the cipher and the key. At this point, the secret isn't a secret anymore.
  • 20. What type of info/work/code can be copyright? Where is it freedom and where is it protection? InterNet new medium - must change business model Cryptography - how do we catch the bad guys?
  • 21. Literature or manifesto? Does Little Brother aim to entertain us, teach us, or convince us? how well does it do any of these things?
  • 22. If you love freedom, if you think the human condition is dignified by privacy, by the right to be left alone, by the right to explore your weird ideas provided you don't hurt others, then you have common cause with the kids whose web-browsers and cellphones are being used to lock them up and follow them around. If you believe that the answer to bad speech is more speech not censorship then you have a dog in the fight. If you believe in a society of laws, a land where our rulers have to tell us the rules, and have to follow them too, then you're part of the same struggle that kids fight when they argue for
  • 23. DO SOMETHING This book is meant to be something you do, not just something you read. The technology in this book is either real or nearly real. You can build a lot of it. You can share it and remix it . You can use the ideas to spark important discussions with your friends and family. You can use those ideas to defeat censorship and get onto the free Internet, even if your government, employer or
  • 24. ā€œI believe that totalitarian ideas have taken root in the minds of intellectuals everywhere, and I have tried to draw these ideas out to their logical consequences.ā€ (Orwell, The Collected Essays, Journalism, and Letters of George Orwell) ā€œā€¦nationalism, religious bigotry, and feudal loyalty are far more powerful forces than sanity.ā€ (Orwell, Wells, Hitler, and the World State)
  • 25. The scene of the book is laid in Britain in order to emphasize that the English-speaking races are not innately better than anyone else and that totalitarianism, if not fought against, could triumph anywhere. (Orwell, Collected Essays, Journalism, and Letters of George Orwell)
  • 26. I do not believe that the kind of society I describe will arrive, (the book is a satire), but that something resembling it could arrive.
  • 28. More RESOURCES http://www.guardian.co.uk/ technology/2007/sep/04/lightspeed http://craphound.com/hpdrm.txt http://craphound.com/msftdrm.txt http://www.boingboing.net/ 2009/04/15/my-drm-and-ebooks- ta.html

Editor's Notes

  1. What kind of person do you think of when you picture a hacker? Does anyone here describe themselves as a hacker? What is the stereotype? How do hackers see themselves? What do you think?\n
  2. \n
  3. \n
  4. How does Doctorow see hackers? How does he want US to see them?\n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n