John Young wrote:
 > A PowerPoint presentation on H.O.P.E. was among the
 > latest:

Worth getting just for those sexy-hype-gifs alone... Surely it's "d4 \/\/4r3Z 
3|V|p1R3" though. I'm afraid, anyway. Pesky punk terrorist paedophile piraters. 
Stop pointing your leet hacker death rays at me!

 > The HOPE program itself was not leaked, but perhaps will be
 > in the future. Mainly what a HOPE-rigged server does is
 > conceal a DIRT tracking and reporting bug in deliberately
 > publicized documents with snoop-appeal, called "dangles,"
 > to ensnare the unwary and to trace the distribution of the
 > dangles as well as to assign an ID to every machine that
 > handles the docs.
[...]
 > As anonymous noted, a fair amount of the material seems
 > designed to exploit the gullible, with a fully panoply of
 > security scare stories and promises of products to
 > deal with any wet dream of intelligence and law enforcement
 > for ballooning budgets and preparing plans for defending
 > against imaginary enemies. Pretty well emulating the
 > digital security market as if Codex was avidly reading
 > this list.

Without dismissing the validity of the leaked code entirely... But an 
interesting proposition. Some quick thoughts on the possible origins and reasons 
for disclosure...

Case 1; the archives are from an old repository of marketing bumph - a directory 
used by, say, Terrance "L" Knawles as a store for external yet confidential 
documents - press releases, financial reports, fancy slideshows and product 
demos. Possible sources are internal employees disgruntled by the 
company/management that have discovered old material, or morally-justified 
hackers playing Codex at their own game. The former is backed up by the 
reputation and public portrayal of Frank Jones, the latter by the (superficial, 
at least) seeming absence of technical presentation or knowledge in any of the 
witnessed documentation (again, I have not run the executables, so am reluctant 
to comment on them) or associated resources (see "website constructed by monkey 
on remote-access riddled Mac server").

Outcome - CDS discredited yet further, world saved.

Case 2; the archives are from an old respository of since-expired and/or 
worthless and/or superceded documents, agreements, reports and programs. To stir 
up some business, CDS (ignoring possible Baiting tactics, although the irony is 
almost unbearable) decides to use the established information dissemination 
network to make DIRT and HOPE household names. After all, people buy things 
simply if they've heard a name before, no matter the context. In addition to 
increased sales and interest, CDS can monitor industry speculation as to current 
technology/possible implementations (of "bugs", HOPE, DIRT v3.0, etc) - minimal 
effort R&D, effectively.

Outcome - HOPE becomes a reality in some aspects, or under some governments.

Without further, more recent evidence, it is hard to have much faith in case 1.
As a note, the apparent lack of "bugs" within released docs should not be taken 
for granted in any repetitions. I suspect CDS would have been watching the 
spread of the first lot with interest, bugged or not.
Both technically and politically, little has been gained from the material seen. 
However, one would hope that the cat is partially out of the bag, and that 
material worthy of discussion would be released soon, to fly in the face of the 
powerpoint propaganda. Maybe it's time to dust off my video of "Hackers", 
jack-in to the cyberunderground and go hunt some orc.

Reply via email to