Ask Experts Questions for FREE Help !
Ask
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #41

    Jan 21, 2011, 03:36 PM
    Quote Originally Posted by tomder55 View Post
    yes or no ...can it be legally used to go into government computers and download filed that are US property ?
    If the user has installed software on their machine to allow their contents to be shared then that's the user's decision, it's not a legality issue no matter how hard you're trying to make it. If the user is not allowed to install that software then they should face repercussions within their organization for breach of contract.
    tomder55's Avatar
    tomder55 Posts: 1,742, Reputation: 346
    Ultra Member
     
    #42

    Jan 21, 2011, 03:49 PM

    So if the user, without knowledge or intention, installs programing that allows pirates to enter his hard drive and steal his files ,it is the users fault and not the person who knowingly enters that person's hard drive to steal the files ?

    That is a ridiculous assetion .
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #43

    Jan 21, 2011, 04:08 PM
    Quote Originally Posted by tomder55 View Post
    so if the user, without knowledge or intention, installs programing that allows pirates to enter his hard drive and steal his files ,it is the users fault and not the person who knowingly enters that person's hard drive to steal the files ?

    That is a rediculous assetion .
    The user installs the software with express intent to share and obtain files from others. When doing a search for keywords or file types you do not know what user has those files.

    I don't know what a "rediculous assetion" is, it looks like English but...

    Bye tom, educate yourself son.

    Unsubscribing.
    tomder55's Avatar
    tomder55 Posts: 1,742, Reputation: 346
    Ultra Member
     
    #44

    Jan 21, 2011, 04:20 PM

    Hasta la vista . Do you have any other examples where the victim of theft is the one at fault ?


    Wait... I take it back.. you have one of those rare opportunities where you can contribute something useful to the discussion.
    Educate me! Tell me how by installing software onto my computer I am at fault if a predator uses that software to gain access to my files and steal them . Even better... tell me how the government is at fault if their computers are hacked because someone sends a GI in Afghanistan and Iraq some music files for their entertainment . To piggy back onto those files means the hacker must be some low life scum . To compromise that soldier's safety by publishing order of battle plans is worse .
    paraclete's Avatar
    paraclete Posts: 2,706, Reputation: 173
    Ultra Member
     
    #45

    Jan 21, 2011, 06:06 PM
    Tom there is a principle here, practised diligently by your government in parts of its endeavours. What you don't protect, you will loose. How come information isn't in the same category. In the real world if you leave something laying around, it inevietably be stolen or just just be assumed abandoned. Why is information different?

    You want to forget that this information has been provided by an insider, one of your own and Assange is merely the vehicle by which it was published, as far as we are aware without attempts to gain directly. Whistle blowers are hated by governments throughout the world, but it is by their actions that we find we are deceived and cheated, not by the actions of governments
    tomder55's Avatar
    tomder55 Posts: 1,742, Reputation: 346
    Ultra Member
     
    #46

    Jan 21, 2011, 06:20 PM

    Clete if you read the converstion prior to this you would see that I linked to instances where Wikileaks piggy backed on peer to peer file sharing by the troops to gain access to the US data base(comment #13) They then trolled and downloaded files... just like any illegal hacker pirate would . Many of these revelations are very sensitive national security information that even you would agree should not be public knowledge.
    This is separate from the traitor PFC Manning's shameful and dishonerable actions .
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #47

    Jan 21, 2011, 06:40 PM
    Quote Originally Posted by tomder55 View Post
    you would see that I linked to instances where Wikileaks piggy backed on peer to peer file sharing by the troops to gain access to the US data base(comment #13) They then trolled and downloaded files ....just like any illegal hacker pirate would .
    That article says nothing of the sort. What does "piggy backed on peer to peer file sharing" even mean? Can you explain it to us?
    cdad's Avatar
    cdad Posts: 12,700, Reputation: 1438
    Internet Research Expert
     
    #48

    Jan 21, 2011, 07:17 PM
    Quote Originally Posted by NeedKarma View Post
    That article says nothing of the sort. What does "piggy backed on peer to peer file sharing" even mean? Can you explain it to us?
    Means it was a trojan file that came with the legitimate software.


    Anyone that installs P2P software is aware they are doing it. But they may not be aware of the consequences of their actions. Its like leaving the door open to your home for anyone to walk in and have a look around.
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #49

    Jan 21, 2011, 07:38 PM
    Quote Originally Posted by califdadof3 View Post
    Means it was a trojan file that came with the legitimate software.
    Agreed that that can happen but the article said nothing like that happened. Tom kept writing stuff like "Wiki through pirateware hitches a ride on the transmission and gains access to a hard drive" which makes no sense whatsoever. Especially when related to music files which are the least likely to contain trojans.
    tomder55's Avatar
    tomder55 Posts: 1,742, Reputation: 346
    Ultra Member
     
    #50

    Jan 22, 2011, 02:30 AM

    So besides your technical nitpicking ;what I was saying was correct. Wiki was using the P2P to infiltrate US computers to steal it's content .

    Edit .last night I heard similar arguments that you surrender your rights when you use file sharing programs ;and it's not theft .

    I think that justification is bogus nonsense. If the government gave soldiers the authorization to send music files to each other it doesn't mean they also gave Wikileaks the right to access the computer and plunder government files .

    This part of the story also has a Chinese connection . Wilkileaks has been aided by Chinese 'hackers' using the TOR network . According to the 'New Yorker ',the Chinese were the ones who stole the many early documents that Assange used to start up Wikileaks .
    http://www.newyorker.com/reporting/2...khatchadourian
    Pure speculation... there are no independent hackers in China. They are part of the government apparatchik.They are conducting espionage for the government and they found a useful idiot in Assange .
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #51

    Jan 22, 2011, 03:53 AM
    Quote Originally Posted by tomder55 View Post
    so besides your technical nitpicking ;what I was saying was correct. Wiki was using the P2P to infiltrate US computers to steal it's content .
    Absolutely not. You can't use p2p to target a single computer.
    tomder55's Avatar
    tomder55 Posts: 1,742, Reputation: 346
    Ultra Member
     
    #52

    Jan 22, 2011, 03:55 AM

    More nitpicking . I used the plural suggesting it was the government network they were accessing .
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #53

    Jan 22, 2011, 03:57 AM
    Jesus dude, read up on the technology. P2P computers are anonymous on the network. You can't send a file a specific computer, it has to basically come get it from you.
    tomder55's Avatar
    tomder55 Posts: 1,742, Reputation: 346
    Ultra Member
     
    #54

    Jan 22, 2011, 04:42 AM

    Let me make it easy for you . I am not really interested in the nuts and bolts about how he was able to access the US database . There were 2 points to make .
    1. We have been told that he was receiving information from whistleblowers. It turns out it was more than that . Besides the pfc Mannings ,he was also hacking into the government system to illegally obtain the files he released.

    2. That the information he has released is not the inconsequential stuff your op suggests . Some of it is . But there is also a lot of stuff released that have real national security implications .

    I really am not interested at all about how p2p works except that according to a number of links on the web. that was his means of access.
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #55

    Jan 22, 2011, 04:58 AM
    Here's a Google search: -inurl:htm -inurl:html intitle:"index of" mp3 "pearl jam" - Google Search

    Click on it, click on the first result, see that list of music? Feel free to right-click and download any song. Congratulations, you are now an amazing hacker and a criminal. That's pretty much exactly how trolling KaZaa worked. Stupid people leave web directories open (as in this case) or choose to share the contents of their C: for the whole world. No hacking required.
    speechlesstx's Avatar
    speechlesstx Posts: 1,111, Reputation: 284
    Ultra Member
     
    #56

    Jan 22, 2011, 07:02 AM
    Quote Originally Posted by NeedKarma View Post
    You can't send a file a specific computer, it has to basically come get it from you.
    And? In the same way you searched for open files you don't think Assange could do the same? Geez dude, we're not stupid.
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #57

    Jan 22, 2011, 07:36 AM
    Quote Originally Posted by speechlesstx View Post
    And? In the same way you searched for open files you don't think Assange could do the same? Geez dude, we're not stupid.
    So you're saying that Assange found the army guy's computer on an anonymous network and sent him a virus? Yea you are stupid about P2P, you can't find a specific computer in the anonymous P2P cloud. If you can show me the specifics on how that can happen I'd be interested to know. You do realize that when you download a file on a P2P network you're getting it from multiple sources, right?
    cdad's Avatar
    cdad Posts: 12,700, Reputation: 1438
    Internet Research Expert
     
    #58

    Jan 22, 2011, 07:46 AM
    Quote Originally Posted by NeedKarma View Post
    So you're saying that Assange found the army guy's computer on an anonymous network and sent him a virus? Yea you are stupid about P2P, you can't find a specific computer in the anonymous P2P cloud. If you can show me the specifics on how that can happen I'd be interested to know. You do realize that when you download a file on a P2P network you're getting it from multiple sources, right?
    Without going into a long and technical explination. Lets just say it can be done. The proof resides in the lawsuits that have been filed against college students for violation of copyrighted materials. And all the bills that came with it.

    Absolute protection is a discipline and most people never reach that far. Look at how many people on a daily basis come here and share way too much information thinking they are imune from harm. As much as a benefit the net is it can also be a nightmare. And yes anyone can be found with the right diligence.
    NeedKarma's Avatar
    NeedKarma Posts: 10,635, Reputation: 1706
    Uber Member
     
    #59

    Jan 22, 2011, 07:54 AM
    Quote Originally Posted by califdadof3 View Post
    Without going into a long and technical explination. Lets just say it can be done. The proof resides in the lawsuits that have been filed against college students for violation of copyrighted materials. And all the bills that came with it.
    That's setting up a honeypot and logging all who connect to it. Even the RIAA don't know who those IPs are, they have to petition the ISPs to get that information. Wow this Assange guy is truly a mastermind and a powerful, powerful man who can get ISPs in many countries to give out personal information. Even the US government can't do that.
    cdad's Avatar
    cdad Posts: 12,700, Reputation: 1438
    Internet Research Expert
     
    #60

    Jan 22, 2011, 08:08 AM
    Quote Originally Posted by NeedKarma View Post
    That's setting up a honeypot and logging all who connect to it. Even the RIAA don't know who those IPs are, they have to petition the ISPs to get that information. Wow this Assange guy is truly a mastermind and a powerful, powerful man who can get ISPs in many countries to give out personal information. Even the US government can't do that.
    Here is where your dropping the ball. All that is needed is an I.P. address and you can do a DNS to see who owns it. If it falls back to the government then from there he did his homework. DNS registration is open to the public and anyone that wants to look.

    Also the government is pushing ISP's to allow them to find anyone at anytime they want without warrant. Its been part of the new debates surrounding the internet and its users. They keep asking and pushing for the key to the door.

Not your question? Ask your question View similar questions

 

Question Tools Search this Question
Search this Question:

Advanced Search

Add your answer here.


Check out some similar questions!

Wikileaks and Afghanistan [ 10 Answers ]

Perhaps nothing has made the situation in Afghanistan more telling than Wikileaks and this particular piece even more telling Rudd: 'Scared as hell' What is described here however briefly is the stuff of legend, allies who have very bad views of each others efforts and a view that irrespective...

Wikileaks [ 38 Answers ]

Wikileaks, good or bad? If you ask me the guy is just after attention for himself, a self-serving publicity hog who in his own words, says "I enjoy crushing bastards." Who else does he like to crush, the 100's of informants working with us whose identity he leaked and put in grave danger?

Which civilization had the greatest impact on the united states government? [ 2 Answers ]

Ancient greece or rome or western europehas the greatest impact on united state government?

How does public policy impact what government ? [ 1 Answers ]

How public policy impacts what government does and how it does it. How the implementation of public policies can lead to the formation of "distributive and regulatory policies" that can adversely impact citizen's lives. How distributive policies help produce environments which fosters and expansion...

Usa government officials allowed to carry arms when in Canada [ 4 Answers ]

I would like to know if anyone has heard about this. As broadcasted on BCTV news this week, there is talk about the possibility of American officials being allowed to carry guns (pistols) when in Canada. They will not need any special clearance. After the initial news report, there has been no...


View more questions Search