667 lines
35 KiB
Plaintext
667 lines
35 KiB
Plaintext
|
|
Episode: 325
|
||
|
|
Title: HPR0325: RoundTable Ep 2: Is There such a thing as Ethical Hacking?
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0325/hpr0325.mp3
|
||
|
|
Transcribed: 2025-10-07 16:25:05
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
MUSIC
|
||
|
|
This is Hacker Public Radio, round table episode number two.
|
||
|
|
The topic today is, is there such a thing as ethical hacking or are we all just evil?
|
||
|
|
I've got three panelists on with me.
|
||
|
|
I've got 330 from LinuxCranx.info.
|
||
|
|
Hello.
|
||
|
|
I have Nick from the Open Source Musicians podcast.
|
||
|
|
I've got AJ from Linux Geekdom Podcast.
|
||
|
|
Hey there, guys.
|
||
|
|
Actually, I think, I mean, 330, I know you've been on HPR a couple of times.
|
||
|
|
Nick, is this your first HPR episode?
|
||
|
|
It is.
|
||
|
|
Cool.
|
||
|
|
And AJ, this is your first HPR episode.
|
||
|
|
Yes.
|
||
|
|
Great.
|
||
|
|
So, that's cool.
|
||
|
|
So, I guess, first, we should probably start by defining what exactly we are talking
|
||
|
|
about when we say hacking.
|
||
|
|
There's, I know, there's penetration of networks.
|
||
|
|
Let's see.
|
||
|
|
There's crackers.
|
||
|
|
Let's say, as far as I figure it, there's only two groups that ever call themselves hackers.
|
||
|
|
There are hackers who are people that sit down at a problem and pound on it until they find
|
||
|
|
a solution.
|
||
|
|
Yeah.
|
||
|
|
And then there are criminals, which do the exact same thing, but do it for a criminal
|
||
|
|
reason.
|
||
|
|
I believe they are called crackers and crackers.
|
||
|
|
A lot of them fit of hackers.
|
||
|
|
Yeah.
|
||
|
|
I just call them criminals.
|
||
|
|
They already have a name.
|
||
|
|
And yet, there is, but there is a concept of an ethical hacker.
|
||
|
|
Yeah.
|
||
|
|
Well, usually an ethical hacker is someone who does a criminal act, but for a good reason.
|
||
|
|
Like, people that did us child porn sites and things like that.
|
||
|
|
It's really, it's basically direct action.
|
||
|
|
It is absolutely illegal, but you're doing it for a higher reason.
|
||
|
|
And then there's people who work at different security companies that are basically glorified
|
||
|
|
beta testers, but are hacking networks, so it's to find loopholes, so it's to patch
|
||
|
|
stuff.
|
||
|
|
Right.
|
||
|
|
Yeah, yeah.
|
||
|
|
But that's usually their own internal network that they're hacking.
|
||
|
|
Usually, yeah, but not always.
|
||
|
|
Sometimes they're hired by outside companies to hack it, but it's still usually a sanctioned
|
||
|
|
network.
|
||
|
|
It's not like they're sitting out on the internet trying to break things.
|
||
|
|
Yeah.
|
||
|
|
They have written permission and all that good stuff.
|
||
|
|
Yeah.
|
||
|
|
And when I think of hacking, especially on the hardware side, you know, I think of making
|
||
|
|
something to what it's not meant for it.
|
||
|
|
Yeah.
|
||
|
|
And that can be a lot of fun.
|
||
|
|
Hardware hacking.
|
||
|
|
Yeah.
|
||
|
|
And that's a whole other dimension.
|
||
|
|
And strangely enough, there's a criminal element to that, too.
|
||
|
|
At least if you follow the letter of the law, because companies don't want you messing
|
||
|
|
with their intellectual property, which is kind of weird and ridiculous to me, but I guess
|
||
|
|
that's the question.
|
||
|
|
It kind of makes you wonder, though, it's you bought the hardware.
|
||
|
|
They're never really going to get it back.
|
||
|
|
Why would they go and care?
|
||
|
|
Say a lot of times they don't, unless there's a service attached to it, like a Tivo.
|
||
|
|
Tivo is a GPL V2 device.
|
||
|
|
By the GPL, you can do pretty much whatever you want with it as long as you don't restrict
|
||
|
|
anyone else from doing it.
|
||
|
|
But because there's a network service behind it, if you hack your Tivo and then put it
|
||
|
|
on the Tivo network of software and stuff, they can make your Tivo no longer work.
|
||
|
|
Well, and the thing was purely for the game consoles, too.
|
||
|
|
Okay.
|
||
|
|
Hack your game console.
|
||
|
|
You can no longer play online games, that's for sure.
|
||
|
|
So I mean, that is.
|
||
|
|
That's them definitely telling you that you're not allowed to do something with your hardware
|
||
|
|
that you purchased.
|
||
|
|
And if you do anything out of that they can detect that is out of the realms of their
|
||
|
|
intention, you don't get to play ball with them.
|
||
|
|
See, I think the whole hacking industry, you could say, is just whether it be software
|
||
|
|
or hardware, the whole thing really just depends on your motives behind it.
|
||
|
|
Like it was brought out earlier.
|
||
|
|
Like if you're trying to find, like they said, shut down the child porn sites.
|
||
|
|
I remember some guy in the, I'm trying to remember when, this fight, I don't remember
|
||
|
|
exactly, but he hacked the WPA security standard and he basically had found a hole by hacking
|
||
|
|
it.
|
||
|
|
But then he reported it so they fixed it and really saved a lot of people because that
|
||
|
|
could have opened up a really, really big hole in the entire Internet security.
|
||
|
|
Yeah, so the whole full disclosure kind of thing.
|
||
|
|
Yeah.
|
||
|
|
As long as you notify everyone after you've destroyed or found the problem with whatever
|
||
|
|
you're hacking on, then it's okay.
|
||
|
|
And I think there is hacking that's kind of harmless.
|
||
|
|
I've heard of people who have hacked targets internal network and started messing with
|
||
|
|
the lights, so it just goes on and off.
|
||
|
|
I mean, that's the kind of stuff that might they be like, what's going on?
|
||
|
|
But as long as they don't destroy stuff, feel like employee records and stuff or credit
|
||
|
|
card numbers, I mean, that can be kind of harmless, so I wouldn't say it's ethical, but
|
||
|
|
I wouldn't really say it's unethical.
|
||
|
|
You know what I would almost, I would argue that it was ethical because those people are
|
||
|
|
furthering their knowledge about something and you never know what they're going to go
|
||
|
|
on to do because they're starting out hacking targets, you know, internal lighting system.
|
||
|
|
Yeah.
|
||
|
|
To be safe.
|
||
|
|
But by turning the lights off and on though, you could actually, there are problems with
|
||
|
|
that.
|
||
|
|
Yeah.
|
||
|
|
People in safety hazards.
|
||
|
|
Yeah.
|
||
|
|
People inside the store could, you know, run into something, run into one of those shells
|
||
|
|
and cut themselves or something like that.
|
||
|
|
Yeah, or panic or something.
|
||
|
|
Or, yeah.
|
||
|
|
All right.
|
||
|
|
So it's unethical.
|
||
|
|
But I still think the spirit is ethical because you are furthering your knowledge.
|
||
|
|
I mean, I guess it's not ethical or unethical that I'm talking about.
|
||
|
|
It's just like being responsible, I guess.
|
||
|
|
Yeah.
|
||
|
|
Because, you know, I know how to change the traffic signal outside my house.
|
||
|
|
Am I going to do it?
|
||
|
|
It's probably not.
|
||
|
|
But the fact that I learned how to do it and know how that just works.
|
||
|
|
Exactly.
|
||
|
|
You know, there's nothing wrong with that.
|
||
|
|
Yeah.
|
||
|
|
There's nothing wrong with the knowledge and obtaining a knowledge is how you obtain
|
||
|
|
the knowledge and what you do with it later.
|
||
|
|
Information isn't inherently better good.
|
||
|
|
It's just information.
|
||
|
|
Yeah.
|
||
|
|
I know a lot of the stuff hackers use to be honest is the stuff.
|
||
|
|
The same information that a lot of networkers use when they're establishing a business network
|
||
|
|
say.
|
||
|
|
So, I mean, the same principles and information that go into that, it goes back to the whole
|
||
|
|
what are you doing with it?
|
||
|
|
Like you said, information is information.
|
||
|
|
It's what you make of it or what you do with it.
|
||
|
|
What about in cases where someone does find something big?
|
||
|
|
I know that I guess the one that I keep thinking of is Dan Kaminsky when he found this
|
||
|
|
DNS issue that he found over the summer, I guess.
|
||
|
|
Like there was this big hubbub about it and then there was a race to find out exactly
|
||
|
|
what the issue was and then he was going to present the findings at Black Hat or something
|
||
|
|
like or Defcon and, you know, it was this big deal and I mean, if he'd released this
|
||
|
|
information earlier, people say, oh, everyone could have exploited it and it would have been,
|
||
|
|
it would have been horrific.
|
||
|
|
When you find out this information, how do you, how do you choose to keep it to yourself
|
||
|
|
and if you're not Dan Kaminsky, how do you get it to the proper channel?
|
||
|
|
You know what I'm saying?
|
||
|
|
It is responsible disclosure.
|
||
|
|
But once you find that exploit, you go to the people who own that hardware who are in
|
||
|
|
charge of making sure it's secure and say, look, I found this and if they don't believe
|
||
|
|
you, you show them you found it and you say, you guys need to fix this and you don't
|
||
|
|
paste it all over the internet before it has been fixed.
|
||
|
|
What Dan did was went to all the people that make DNS serving software.
|
||
|
|
He got them all together.
|
||
|
|
I think it, Microsoft's campus and Redmond and went, you guys, this isn't a trick.
|
||
|
|
I actually know how this works.
|
||
|
|
Here's how it works.
|
||
|
|
He did a demonstration for him and he said, you have to fix this and it took him nine
|
||
|
|
months to even do anything about it.
|
||
|
|
Yeah, which is ridiculous, but it's also, I mean, how do you get that if you're not
|
||
|
|
Dan Kaminsky, you know, I guess you probably wouldn't have found the DNS hole if you weren't
|
||
|
|
Dan Kaminsky.
|
||
|
|
I mean, I'm just thinking, I mean, how does an average hacker who did find a big security
|
||
|
|
hole?
|
||
|
|
How would you call someone together?
|
||
|
|
I don't know how that works.
|
||
|
|
I guess you just shoot some emails off to the people who own it, huh?
|
||
|
|
Yeah.
|
||
|
|
And if, you know, if there are bug tracking systems reported as a bug, but hoping that those
|
||
|
|
bug tracking systems are much more effective than Windows bug tracking systems.
|
||
|
|
Yeah.
|
||
|
|
Really, the problem is, if you're the idea that people have of a hacker, you know, the
|
||
|
|
greasy-haired punk sitting in your mom's basement, you know, I have a coupler anymore, but
|
||
|
|
the war games type hacker, you're not going to get listened to.
|
||
|
|
And at that point, you have to try everything you can.
|
||
|
|
And then when no one listens to you, you just kind of have to release it to everyone.
|
||
|
|
Yeah.
|
||
|
|
It's kind of one of those things where if you go through the proper channels and try and
|
||
|
|
get things worked out, and nobody listens to you, and then you try again, and still nobody
|
||
|
|
listens to you, then it's one of those things you've done your part, then they're not going
|
||
|
|
to listen to you, then maybe they'll listen to the entire internet effort work.
|
||
|
|
Right.
|
||
|
|
Yeah.
|
||
|
|
Sometimes it almost seems like we're exposing like these weird little things that no one
|
||
|
|
wouldn't even know about if we didn't really, like, pound away at it.
|
||
|
|
Well, here's the thing.
|
||
|
|
Human beings aren't that clever.
|
||
|
|
People come up with the same exact idea independently of each other all the time.
|
||
|
|
That's why software patents and stuff like that exist.
|
||
|
|
Two people could have come up with the wheel at the exact same time.
|
||
|
|
Human beings aren't that clever.
|
||
|
|
So if you can think of it, someone else is going to.
|
||
|
|
The best thing you can do is hope to God that you're the first person that found it, and
|
||
|
|
that you can get it fixed before the next guy thinks of it.
|
||
|
|
You know, because the DNS flaw that Dan Cominsky found wasn't that brilliant.
|
||
|
|
He thought, hey, I wonder if this is giving out information in a linear fashion, and it
|
||
|
|
was.
|
||
|
|
And all you have to do is randomize the ports and then, hey, it breaks that whole flaw.
|
||
|
|
But anyone else could have thought of it.
|
||
|
|
If someone other than Dan Cominsky would have thought of it, we've all would be in a very
|
||
|
|
bad situation right now.
|
||
|
|
And so why aren't more hackers being payrolled by these big companies, I wonder?
|
||
|
|
Probably because the average hacker can find the small bugs, but it's the deeper, in-depth
|
||
|
|
holes that the big companies are going to be looking for, or the things that the average
|
||
|
|
hacker just, it's over their heads.
|
||
|
|
And the number of real elite hackers out there, I know personally, I've never really done
|
||
|
|
any hacking.
|
||
|
|
I'd love to learn how, but there's so much involved, but the number of real elite hackers
|
||
|
|
out there is just very, very small.
|
||
|
|
There's a lot of the average hackers and the better an average, but the real elite is
|
||
|
|
a very, very small group.
|
||
|
|
Yeah, but what is hacking then?
|
||
|
|
I mean, isn't it just basically obsessing over something?
|
||
|
|
That's true.
|
||
|
|
Yeah.
|
||
|
|
So I'm going to be someone who sits in front of videos all day and figures out how to
|
||
|
|
transcode and edit differently and stuff like that, I'm a video hacker.
|
||
|
|
Right.
|
||
|
|
Yeah.
|
||
|
|
I mean, you have people that are, you know, life hackers that sit there and obsess about
|
||
|
|
how they exist, you know, you have GTD nerds or hackers.
|
||
|
|
Right.
|
||
|
|
How do I do these four things and make myself a million times more productive?
|
||
|
|
It's all still hacking.
|
||
|
|
It's still the same mindset.
|
||
|
|
It's basically altering something from one form to another.
|
||
|
|
I guess it would be the best definition of hacking because you're taking something as
|
||
|
|
it is and changing it or modifying it in some way to serve a given purpose.
|
||
|
|
Right.
|
||
|
|
But I really do think it takes that obsessive mindset about it.
|
||
|
|
Oh, yeah.
|
||
|
|
And people who hack hardware, they know exactly where all the connections are and how they
|
||
|
|
work.
|
||
|
|
And that's how people learn to take a rig like a computer that most people would be able
|
||
|
|
to get extra formance out of and get so much more out of it just by tweaking a couple
|
||
|
|
of things.
|
||
|
|
They know how to, the inner workings work because they've looked at it and studied it
|
||
|
|
and done research on it and then maybe edited the speeds of things and maybe even tweaked
|
||
|
|
the hardware a little bit, something to make it work more efficiently than what it had
|
||
|
|
done before.
|
||
|
|
Yeah.
|
||
|
|
And I think that kind of sums up like the methodology of hacking to me.
|
||
|
|
I mean, you have to have the hard knowledge.
|
||
|
|
Like if you're going to do a hardware action, for instance, you probably need, like if
|
||
|
|
you're really going to do serious hardware hacking, you need like electrical engineering.
|
||
|
|
You need that understanding.
|
||
|
|
And just having the, by the book, understanding of it is only going to get you so far, it's
|
||
|
|
going to help you build a computer.
|
||
|
|
But then going deeper than that and like obsessing over something and saying, well, what if I
|
||
|
|
reroute this one connection over here or what if I overclock this by attaching this
|
||
|
|
wire?
|
||
|
|
You know, whatever.
|
||
|
|
That's the kind of, the obsession I think is what gets you into the really cool discoveries
|
||
|
|
I guess.
|
||
|
|
I was just going to bring it back to the why aren't companies paying people to do this.
|
||
|
|
There are companies that are paying a hardware hack or not hardware hackers, but criminal
|
||
|
|
hackers.
|
||
|
|
And it's organized crime, you know, the old, you know, what still exists of the Russian
|
||
|
|
mafia hires high school college kids in America that, you know, are that know about these
|
||
|
|
exploits and pay them to write software that any idiot can run.
|
||
|
|
And I mean, that's why all these, um, these botnets and stuff are around, you know, it's
|
||
|
|
not because, hey, wouldn't it be funny too?
|
||
|
|
It's, hey, I bet you I can make $100,000 in a week by selling this to the Russian mob.
|
||
|
|
So you're seeing all those spam comments I have on Unix porn from.ru email addresses aren't
|
||
|
|
really people who are fascinated by my site.
|
||
|
|
Sorry.
|
||
|
|
There is a way to make money in it, but it's the same way that people make money dealing
|
||
|
|
drugs and human trafficking.
|
||
|
|
It's all still extremely hardcore criminal elements of things.
|
||
|
|
I think the way you're talking people that are paying, but they're not people you want
|
||
|
|
to be involved with.
|
||
|
|
The way you're talking though, it makes it sound like the only kind of hacking is criminal
|
||
|
|
hacking.
|
||
|
|
No, no, I hack things all day.
|
||
|
|
I mean, I'm a very obsessive person else that they're in beat my head on something until
|
||
|
|
it finally cracks, but there are people that they use the hacker ethos, you know, the
|
||
|
|
obsession, and then really it's all exactly the same until the end point where they, instead
|
||
|
|
of going, oh crap, I need to tell people about this, they go, I'm going to shut up, and
|
||
|
|
I'm going to sell this.
|
||
|
|
Okay.
|
||
|
|
That's the point where it becomes evil hacking when you're not being responsible with knowledge
|
||
|
|
that you get.
|
||
|
|
Yeah, because I think that's when you cross that line.
|
||
|
|
You're screwing over other people essentially to make money instead of helping to fix
|
||
|
|
problems.
|
||
|
|
I mean, they're fairly say evil because evil has other things attached to it.
|
||
|
|
You're just being a douchebag.
|
||
|
|
Yeah, there we go.
|
||
|
|
I mean, you know, evil has some kind of religious tone to it, and there's multiple sides.
|
||
|
|
To them, they're not evil.
|
||
|
|
They are just trying to make a buck, but I think most people can identify a douchebag when
|
||
|
|
they see it.
|
||
|
|
Yeah.
|
||
|
|
You mean the pops collar?
|
||
|
|
It's the pop collar of hacking, yes.
|
||
|
|
What about the people, I don't know, like, at least like me, I'm not making any big
|
||
|
|
new discoveries.
|
||
|
|
You know, I'm not exposing any new ways, you know, transcoding a video or a big hole in
|
||
|
|
something, you know, but I still think of myself a bit of a hacker because I sit there
|
||
|
|
and obsess over, well, what if I do it this way or what if I do this or how do I set up
|
||
|
|
it?
|
||
|
|
Well, like you, 330, I mean, you spent, I don't know how long setting up that server
|
||
|
|
with the open-goo server on it and the iOS, you know, I mean, it took you a while.
|
||
|
|
I would consider that hacking, even though it's not like, it's not discovering anything
|
||
|
|
new.
|
||
|
|
Is that still hacking, do you think?
|
||
|
|
Well, yeah, not everyone writes the hottest new insert your favorite application here.
|
||
|
|
Yeah.
|
||
|
|
There are a lot of people that sit around hacking on code, and it's never going to be
|
||
|
|
amazing.
|
||
|
|
You know, people aren't going to clamor for it, no one's going to pay $10,000 a seat
|
||
|
|
for it.
|
||
|
|
But you put the same amount of effort into it, and it doesn't make it any less awesome
|
||
|
|
to you or any less hacking.
|
||
|
|
I don't think that you need other people's approval for it to be hacking or to be useful.
|
||
|
|
As long as you find it useful and you work your ass off on it, you hacked it.
|
||
|
|
You know what I mean?
|
||
|
|
That's like going up to someone with an iPhone and they say, yeah, I hacked my iPhone.
|
||
|
|
I mean, big deal you hacked it.
|
||
|
|
What you did was you downloaded like a little installer and you double-cooked on it and
|
||
|
|
it did it for you.
|
||
|
|
It jail-broke it.
|
||
|
|
It doesn't mean you hacked anything.
|
||
|
|
It just means you're a script kitty for your iPhone.
|
||
|
|
Yeah.
|
||
|
|
I mean, that's where the media's use of the term hacking has really screwed everything up.
|
||
|
|
And everybody comes back to this, you know, do we need a new word for it?
|
||
|
|
The media screwed it up, not us.
|
||
|
|
I don't know.
|
||
|
|
I consider, I guess I think of a hacker with a capital H and a hacker with a lower case
|
||
|
|
H.
|
||
|
|
And people like me or a lower case H and people like, I don't know, Dan Kaminsky or
|
||
|
|
a capital H or something like that.
|
||
|
|
Well, I just, I kind of think about it like punk rock.
|
||
|
|
All right.
|
||
|
|
You've got, you've got black flag, which is by far one of the greatest punk rock acts
|
||
|
|
ever to exist.
|
||
|
|
Sure.
|
||
|
|
And they are no more punk than the 15-year-old kid, you know, hanging out with his buddies
|
||
|
|
in the garage playing punk rock.
|
||
|
|
It's all punk rock.
|
||
|
|
Yeah, yeah.
|
||
|
|
I get it.
|
||
|
|
I can relate to that, actually.
|
||
|
|
I don't, I don't think that it really needs to have a hierarchy.
|
||
|
|
Right.
|
||
|
|
And people really want, are spending way too much time of their life classifying things.
|
||
|
|
They categorize, and they sub-categorize, and they sub-categorize, they sub-stop
|
||
|
|
waiting for that time and go hack something.
|
||
|
|
That is hacking, that's hacking categorization without those people, without those people
|
||
|
|
we would have nothing but just, you know, everything would be lumped in together.
|
||
|
|
I can't argue with that.
|
||
|
|
I can't argue with it.
|
||
|
|
Okay.
|
||
|
|
What about this?
|
||
|
|
What about companies, you know, getting back to the hardware stuff, because that's kind
|
||
|
|
of interesting to me.
|
||
|
|
What about these companies that are saying, you can't hack this?
|
||
|
|
I mean, is it unethical for them to say that we can't hack their hardware?
|
||
|
|
Oh, absolutely.
|
||
|
|
I mean, you think about it, they're basically saying, we're the only ones who can make progress
|
||
|
|
in the computer industry for a graphics card, a sound card, a motherboard, a hard drive,
|
||
|
|
anything.
|
||
|
|
I mean, they're basically trying to monopolize the industry by controlling the progress
|
||
|
|
based on how they make it, so that when the next great thing comes out, it wasn't released
|
||
|
|
by some guy who figured out a better way to do it, from Idaho and his basement.
|
||
|
|
It was figured out by a big company who can then really profit from it.
|
||
|
|
Let's say I don't think that a lot of companies are actually telling people you can't do
|
||
|
|
this.
|
||
|
|
You know, they tell you, go right ahead and have fun, but you'll void your warranty.
|
||
|
|
Or you'll break your device, little demo cases.
|
||
|
|
Like I said, there aren't many, but there are some, you know, without naming names, companies
|
||
|
|
like that tend to do that across the board of their entire product line, and actually
|
||
|
|
into other product lines that may converge with their product line.
|
||
|
|
There are a lot of companies out there that, when they release a firmware upgrade, they'll
|
||
|
|
add this great nice feature, but they've learned about this hack that a ton of people
|
||
|
|
have done to their device.
|
||
|
|
That firmware upgrade will try to disable your device completely if you've done that,
|
||
|
|
just because it no longer gives them complete control over what you're allowed to do with it.
|
||
|
|
Yeah, the thing I'm thinking of with that is like the Sony PSP.
|
||
|
|
You buy a brand new game and it reloads your firmware and all of a sudden you can't play,
|
||
|
|
what we'll call them home brew games, but really what they're trying to stop is software
|
||
|
|
piracy.
|
||
|
|
And you know, that really bugs me there to say, no, it would come up, as you are allowed
|
||
|
|
to legally make one copy of every game you are.
|
||
|
|
But if, you know, they disable any way that people come up with, you need to play that
|
||
|
|
legal backup.
|
||
|
|
But if there are, if the original source is encrypted, which I can't think of a game
|
||
|
|
that doesn't come unencrypted, except for maybe a world of goo at this point, maybe
|
||
|
|
some independent stuff, but all that is encrypted.
|
||
|
|
And due to the Digital Millennium Copyright Act, if you circumvent encryption, you don't
|
||
|
|
even have to break it.
|
||
|
|
If you can copy it in place with the encryption, you've still broken the idea of encryption
|
||
|
|
and you're still in violation.
|
||
|
|
No, you're not violating it if you don't script it.
|
||
|
|
That's being debated in court right now.
|
||
|
|
Really?
|
||
|
|
Yes.
|
||
|
|
Yeah.
|
||
|
|
Basically, the idea is that if you made a copy of a DVD as a full ISO file, for bit exactly
|
||
|
|
the same, what you've done is circumvent the idea of the encryption, the intent of the
|
||
|
|
encryption.
|
||
|
|
Yeah.
|
||
|
|
And we may, we as in people that actually don't want this kind of thing to happen, may
|
||
|
|
lose this fight and lose it hard.
|
||
|
|
Oh, that would be, then basically they're saying, if you lose your disc and you wanted to
|
||
|
|
make backups, you can't make backups, and if you lose your disc, you're out of luck,
|
||
|
|
you'll just have to go buy another one.
|
||
|
|
Well, they tell you to go buy a backup.
|
||
|
|
Why don't you have two copies of it?
|
||
|
|
Go buy two copies.
|
||
|
|
Oh, yeah.
|
||
|
|
Which, I'm taking the devil's advocate on that point.
|
||
|
|
I want everyone to know that I think that's bullshit, and I think that it's just unfathomable
|
||
|
|
how someone could actually think that, but playing devil's advocate, why don't you just
|
||
|
|
go buy two copies?
|
||
|
|
People that buy comic books that want a one to read and one to save forever, they go
|
||
|
|
buy two.
|
||
|
|
They don't make a copy of their comic book to read and then have the one that they bag
|
||
|
|
and board.
|
||
|
|
Yeah, but that's different.
|
||
|
|
DVDs aren't exactly something you're going to save forever as, unless it's like some
|
||
|
|
special collector set of Star Wars signed by George Lewis or something.
|
||
|
|
I mean, it's one of the things to these companies, it is.
|
||
|
|
A product is a product.
|
||
|
|
They don't care what format it's in.
|
||
|
|
It's like, it's like empty free.
|
||
|
|
If you download an empty free, that's DRM, you have no reason to want to back that up.
|
||
|
|
And you see, I think the, by the industry doing this and causing all this encryption on
|
||
|
|
data and saying, we don't want you to back it up or do this.
|
||
|
|
Basically, by trying to prevent piracy, they've increased it and things like the pirate
|
||
|
|
band.
|
||
|
|
It said this past year, they just got to over seven million users and that's not counting
|
||
|
|
all the people who don't sign up for it, but still get torrents from there.
|
||
|
|
You think about that?
|
||
|
|
These companies are saying, we don't want to lose money.
|
||
|
|
We don't want people stealing our data.
|
||
|
|
But if they were to keep it unencrypted and available to people, then they wouldn't
|
||
|
|
have as big a problem with this, because people would be like, okay, I buy a song and
|
||
|
|
I buy tunes.
|
||
|
|
I can put it on as many devices as I want.
|
||
|
|
But now it's like, you can put it on like just a couple of devices and if something happens
|
||
|
|
to your collection or those devices, you're screwed.
|
||
|
|
So here's a question.
|
||
|
|
Are the guys at the pirate bay hackers?
|
||
|
|
Yes, I would have to say it.
|
||
|
|
I would say yes as well, because they're getting around something, yeah, they're getting
|
||
|
|
around some of the problem, the roadblock.
|
||
|
|
To be honest, I think anyone who uses torrents is a hacker, but kind of like the lower case
|
||
|
|
H type hacker, not the...
|
||
|
|
Oh, you're categorizing again.
|
||
|
|
No, come on, not at this point.
|
||
|
|
Look, any mouth breather can use a torrent site.
|
||
|
|
It's not that hard.
|
||
|
|
Not a mouth breather, but yeah, most.
|
||
|
|
No, believe me, I spent several hours with a mouth breather a couple days ago and he was
|
||
|
|
torrenting.
|
||
|
|
All right.
|
||
|
|
I am talking lowest common denominator here and he could do it.
|
||
|
|
If you actually like listen to discussions with the guys from the pirate bay, they are
|
||
|
|
absolutely hackers.
|
||
|
|
It's a totally decentralized thing.
|
||
|
|
No one knows who did any of it.
|
||
|
|
They have like, they have this admin account that anyone that asks can get the password
|
||
|
|
to and you just make your change and walk away from it.
|
||
|
|
That's how it became the number one greatest store with no price on the internet.
|
||
|
|
Well, it's kind of like they've basically taken what Napster did and fixed all the mistakes.
|
||
|
|
Napster's mistake was just having a centralized location.
|
||
|
|
So basically you're saying they decentralized location, so what torrenting does and that
|
||
|
|
if you lose one person, you still got 100,000 to back it up.
|
||
|
|
Say, but it's not even the location that they decentralized.
|
||
|
|
There's no chain of command in their recent court case.
|
||
|
|
They kept going, who is the man on top?
|
||
|
|
Who's the admin?
|
||
|
|
And they went, everyone, there is none.
|
||
|
|
The courts can't get their heads around an idea that it may just be something that exists.
|
||
|
|
No one owns it.
|
||
|
|
It's just there.
|
||
|
|
And I think it's just out in cyberspace.
|
||
|
|
That's the biggest hack.
|
||
|
|
It has nothing to do with the software or enroading around laws or any of that.
|
||
|
|
They hacked the way people think.
|
||
|
|
That's the most important part of that is changing your hardware, your software, any of that.
|
||
|
|
Those are all in goals, but really hacking is about changing the way you think about something.
|
||
|
|
I'm going to say I'm impressed, these guys, yeah, it is just a thing that exists on
|
||
|
|
its own.
|
||
|
|
What's also really cool is, right now, they still need the pirate bait up as a tracker.
|
||
|
|
Well, they're working on ways for decentralized tracking.
|
||
|
|
So if their servers got blown up tomorrow, all those torrents are still available.
|
||
|
|
And it could just move anywhere in the world they wouldn't back.
|
||
|
|
So here's the really interesting thing is, and you'll have to go back into other HPR episodes
|
||
|
|
because I don't remember the name of the broadcaster, but the same broadcaster that put out all
|
||
|
|
the Beatles tracks a couple months ago on BitTorrent, they are actually using the software
|
||
|
|
that the guys from the pirate bait created to run their own tracker site instead of,
|
||
|
|
you know, like in the US, all the media companies put it up in streaming flash.
|
||
|
|
You go to CDS and you can watch pretty much whatever you want, but it's in flash and it's
|
||
|
|
only there for as long as it's there.
|
||
|
|
These guys are actually putting this out on BitTorrent and going, have at it.
|
||
|
|
I don't know if they have ads or anything in it, but if they do, you can sell the ad
|
||
|
|
as this ad will be seen forever because we're going to put this out here and people are
|
||
|
|
going to be able to share this thing.
|
||
|
|
So you're going to get between 10,000 and 600 million views.
|
||
|
|
I mean, that's a really smart way of doing it, and you're going to get that media out there
|
||
|
|
to anyone who would ever want to listen to that music because it's an old video.
|
||
|
|
Right.
|
||
|
|
You don't have to pay for it.
|
||
|
|
We'll say or watch that TV show, you know, because I think it's a national, like a
|
||
|
|
nationalized media thing, you know, it's kind of like a PBS in America.
|
||
|
|
Well, it's more like the BBC in England, where it's paid for through tax money or, you
|
||
|
|
know, some kind of TV license or something, for the benefit of everyone in that country.
|
||
|
|
So they've already made their money off of it.
|
||
|
|
The taxes were already collected.
|
||
|
|
It's just stuff now that's sitting around and they don't have like the BBC where they're
|
||
|
|
exporting it everywhere because not everyone speaks.
|
||
|
|
I think it was Swedish.
|
||
|
|
It might have been.
|
||
|
|
I thought it was Norway, but yeah, whatever.
|
||
|
|
They're just giving it away because there's no, they don't really have another revenue
|
||
|
|
source.
|
||
|
|
And they're not really interested in waiting for one to show up.
|
||
|
|
So why not just give people the thing they already paid for?
|
||
|
|
And I personally, I love the idea of the perpetual ads, like just going, we can guarantee
|
||
|
|
you that it'll get this many downloads because everything else did.
|
||
|
|
But after that, you could grow tenfold.
|
||
|
|
So you know, pay us for what we know you'll get and hopefully we can negotiate a little
|
||
|
|
bit more and you'll probably get a million times more than you ever paid for.
|
||
|
|
Yeah, well, it's a brilliant scheme, I think, and it's, you know, the whole open source
|
||
|
|
model in a way because you're just saying, here's, here's the information, take it whenever
|
||
|
|
you want it.
|
||
|
|
I mean, that's kind of, I don't know if that's open source or hacker ideal or whatever,
|
||
|
|
but it's the same idea, I think.
|
||
|
|
Well, I think it has real work with a hack.
|
||
|
|
The whole idea of free software and open source.
|
||
|
|
It was a hack.
|
||
|
|
It was a hack, and again, it was a hack of the way people thought of things, yeah, because
|
||
|
|
people were just trying to wrap their mind around.
|
||
|
|
Yeah, yeah.
|
||
|
|
Because I mean, people are still thinking in a lot of ways that open source was somehow
|
||
|
|
be piracy, but I think you're, you hit the nail right on the head with the idea that
|
||
|
|
open source is a hack because you think about programs like Microsoft's Office Suite and
|
||
|
|
then you think of things like openoffice.org where they do all the same things, whereas
|
||
|
|
one several hundred dollars, the other's free, obviously there's got to be some similarity
|
||
|
|
and code there.
|
||
|
|
So obviously, at some point, it's been a hack to get that code, maybe I'm doubting it
|
||
|
|
was illegal, but it was obviously someone hacked it so as to say, you know, I don't feel
|
||
|
|
like buying that.
|
||
|
|
I still want the feature and services.
|
||
|
|
They basically just said, hey, I'm going to write a program to do what I need it to do.
|
||
|
|
And then when they got it working, they put it out on the internet and now pretty much
|
||
|
|
everyone who uses Linux uses OpenOffice and they released a version for Windows.
|
||
|
|
So now openoffice is kind of a bad example there, but you know, that's how a lot of software
|
||
|
|
came about.
|
||
|
|
But OpenOffice started StarOffice, which is bought by Son later open source and then renamed
|
||
|
|
OpenOffice.
|
||
|
|
Yeah.
|
||
|
|
And really that again goes back to my point that people aren't clever, how many different
|
||
|
|
people had the idea of a word processor, which is basically some kind of markup language
|
||
|
|
that formats a page for printing.
|
||
|
|
I doubt Microsoft was the first one to have it.
|
||
|
|
I mean, you know, we can all sit around, you know, as soon as I said that everyone started
|
||
|
|
going, I could do it, you know, little XML here and there and it spits out a page the way
|
||
|
|
you put it on the screen, you know, and there are probably a million ways to do it.
|
||
|
|
So I'm sure that there are similar things between Office and OpenOffice.
|
||
|
|
They're probably functionally completely different and actually it's a good thing.
|
||
|
|
No one ever has the perfect idea.
|
||
|
|
They just have the idea that was good enough to make the damn thing work.
|
||
|
|
True.
|
||
|
|
And that's where people use the program and when reason open open source is still successful
|
||
|
|
because people go or people write a program, people use it and go, you know, I would really
|
||
|
|
like this feature, that feature in it.
|
||
|
|
And then people are like, hey, that's not a bad idea.
|
||
|
|
They integrate it, updates release, it's installed and boom, now you've got exactly what
|
||
|
|
you were looking for.
|
||
|
|
And then you have a hundred other people going, that feature is awesome, but you totally
|
||
|
|
did it wrong.
|
||
|
|
Exactly.
|
||
|
|
So that's why open source is so beautiful because you can customize it exactly the way
|
||
|
|
you are.
|
||
|
|
And at that point, they submit the patches for what they think it should be.
|
||
|
|
If they're not accepted, they can fork and have their own project do it the way they
|
||
|
|
envision it.
|
||
|
|
Okay.
|
||
|
|
So hacking so far is being judged ethical because it brings all of us free stuff, like
|
||
|
|
stuff that we don't want to pay for.
|
||
|
|
It reveals security problems and it possibly reveals advancements in like either hardware
|
||
|
|
or software progress or just kind of the way everyone thinks.
|
||
|
|
Hacking in itself is ethical, the act of learning something new by being obsessive and just
|
||
|
|
pounding your head at it, there's nothing unethical about that.
|
||
|
|
It's what you do with your end result and that's just like everything.
|
||
|
|
If you build a firework in your backyard, if you shoot it up in the air and it explodes,
|
||
|
|
it's a firework.
|
||
|
|
But if you pointed it at someone and it explodes and kills someone, you've made a grenade.
|
||
|
|
You've made a rocket explosive.
|
||
|
|
The same exact thing can do two separate things and one is ethical and one isn't.
|
||
|
|
It's how you use it and people use things a lot of times, not for reasons not designed
|
||
|
|
or not intended by the maker.
|
||
|
|
People will take something like say a knife that was designed to chop vegetables and use
|
||
|
|
it to murder someone.
|
||
|
|
Setting up a server in my own house and breaking in through SSH because of some vulnerability
|
||
|
|
and let's say I had an old Debian box and I could break the key because it was only 16
|
||
|
|
bit.
|
||
|
|
If I do it to myself, there's nothing wrong with it.
|
||
|
|
I agree.
|
||
|
|
But here's the question, because I agree with what is being said, but it sounds like
|
||
|
|
some of our quote ethical, yeah, it's ethical, unquote, it is based on our particular moral
|
||
|
|
basis.
|
||
|
|
So we're saying, well, it's ethical because it skirts taking advantage of people who can't
|
||
|
|
afford an office suite or it's showing these companies that they don't control their
|
||
|
|
own hardware or whatever.
|
||
|
|
You know, I mean, who decides whether this is a good thing or a bad thing?
|
||
|
|
Like, might a hardcore capitalist say, well, this free software stuff is, you know, basically
|
||
|
|
copying an idea from someone else and giving it away for free and that's bad or something
|
||
|
|
like that.
|
||
|
|
I mean, why are we saying it's ethical or was the question wrong anyway?
|
||
|
|
I know you just said, you know, you said someone's coming from the point of, okay, will this
|
||
|
|
make me money?
|
||
|
|
Well, I think the question should be, is will this benefit humanity?
|
||
|
|
To that back, take a look at it as a whole, you know, in a hundred years, will it matter
|
||
|
|
if that guy made money or if we did something that benefited everybody?
|
||
|
|
Right.
|
||
|
|
So I think that's more of a viewpoint as you're pointing from.
|
||
|
|
Okay, cool.
|
||
|
|
Well, thanks for being on Nick from Open Source Musician's Podcast.
|
||
|
|
Thanks for being on.
|
||
|
|
For having me.
|
||
|
|
No problem.
|
||
|
|
Thank you, AJ, from Linux Geekdom Podcast.
|
||
|
|
I love being here.
|
||
|
|
Thanks.
|
||
|
|
Yeah.
|
||
|
|
I mean, both of you, since this was your first HPR episode and anyone else listening, if
|
||
|
|
you ever want to contribute a hacker public radio episode, it is an open forum.
|
||
|
|
It's a community-based podcast.
|
||
|
|
All you have to do is email either me or Enigma or, you know, just get on the website,
|
||
|
|
hackerpublicradi.com and find the email link to submit a show.
|
||
|
|
And generally speaking, we're really happy to get them.
|
||
|
|
Thank you, 330, and you're from Tilt now, right?
|
||
|
|
Something kind of tacky.
|
||
|
|
What a free Linux helpline.
|
||
|
|
Free Linux helpline.
|
||
|
|
What's the site for that, by the way?
|
||
|
|
FreeLinux helpline.mit.
|
||
|
|
Okay.
|
||
|
|
FreeLinux helpline.net.
|
||
|
|
That's a really cool new podcast that helps people with Linux questions, and it can be a live
|
||
|
|
college, or even.
|
||
|
|
Yeah.
|
||
|
|
Cool.
|
||
|
|
All right.
|
||
|
|
So this has been the second round table for hacker public radio.
|
||
|
|
My name's Klatsyu, and thanks for listening.
|
||
|
|
Thank you for listening to hacker public radio.
|
||
|
|
HPR is sponsored by tarot.net.
|
||
|
|
So head on over to C-A-R-O dot N-E-T for all of us in need.
|
||
|
|
Thank you.
|