Hacker Newsnew | past | comments | ask | show | jobs | submit | more paralelogram's commentslogin

Why are almost all official documents about Russian government-sponsored hackers "secret" or "top secret"?


Counter question: why wouldn't they be?

Either their methods work, and of course they should be secret, or their methods don't work, and it's unproductive to help them shorten the list of attack methods they try.


In this case, my guess would be fear that people would start distrusting these voting machines and, eventually, the election as a whole. Elections only work when everyone agrees the results are fair.

That said, I think that's an important story here. The infrastructure around these machines seems sloppy. The fact that there's no source code to read means they are black boxes we have to trust.


In 2003-2004 I had a non-SSL IRC server in a German datacenter and found that something between my server and large British ISPs was rewriting all "ISON <nickname>" strings in TCP streams to "PRIVMSG <nickname> :!kapa". I moved the IRC server to another IP address and never had this problem again.

I think that GCHQ was monitoring the network traffic and had a bug in their IRC protocol implementation.



Some FTP servers support compression: http://www.proftpd.org/docs/contrib/mod_deflate.html


There's edge cases for nearly all of FTPs failings but none of them are employed as part of the default standard protocol. Which means nearly everyone ends up falling back to the lowest common denominator.


How does issuing certificates for test1.com, test2.com, test3.com etc. "threaten the integrity of the encrypted Web"?


These domains belong to someone. Someone who likely hasn't agreed. It's deeply troubling when a CA says: "We'll just issue some test certs for domains that sound like we could use them for testing - no matter whom they belong to and if they agree to that." It's quite simple: Don't issue certs unless the owner of that domain has asked you for it.

But if you look closer at Andrew's mail: There were a bunch of other certs for all kinds of domains.


Especially when we have TLDs for this purpose (.test and .invalid), it's just plain sloppy.


CAs would not be allowed to use those TLDs under the current rules. They have two options for testing:

1. Use domains they own.

2. Use a testing environment that doesn't issue publicly-trusted certificates.


> * it's just plain sloppy*

Sloppy is an oopsy. This is negligence.


It's not about these particular certificates, it's about the fact that Symantec issued obviously bogus certificates at all, and then that they either didn't catch it or they caught it and decided to try not to tell us about it.

Even at best this is further evidence of incompetence, and incompetence certainly does threaten the integrity of the encrypted Web.

Ask yourself, if Symantec's "security" systems can issue for example.com without getting consent from the owner of example.com and Symantec don't notice, why not for your domain, or mine, or a big bank?


How does it not threaten the integrity of the encrypted Web?





It's possible to use Twitter via SMS: https://support.twitter.com/articles/14014


It would be pretty weird if SMS were available but not data.


No it wouldn't. SMS is actually a control message on the voice stream (my words might not be precise). You can send SMS with no data connectivity.


I meant in this particular case it would be weird, because it would mean that the perpetrators are somehow blocking mobile data but neglected to block SMS.


Right, and there are ways you can consider the validity of either method, but to block SMS would mean blocking voice.

Perhaps a temporary data hiccup might be a more realistic solution (or simulation, if malicious) versus "Call cannot be connected".


I think a state actor could filter at will, since they could MITM the connection and pass stuff through selectively. Not that I can see why they would bother. Although I can't see why they would take this action at all, which is why I don't believe the story in the first place.


Pretty much, agreed.


RSS, Usenet newsgroups, netbooks, 4:3 CRT monitors, GNOME 2.x, non-BitTorrent file sharing networks.


Regarding that last one, there's still Usenet, eMule, and DC++ to consider. Many anime fansubbing groups use XDCC to distribute releases.


There's also Soulseek for music sharing, but let's not promote it too heavily, I don't want a repeat of what happened to Napster.


I still use RSS much.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: