{"id":586,"date":"2000-10-28T02:07:55","date_gmt":"2000-10-28T02:07:55","guid":{"rendered":"http:\/\/www.soulhuntre.com\/items\/date\/2000\/10\/28\/how-2-b-3leet\/"},"modified":"2000-10-28T02:07:55","modified_gmt":"2000-10-28T02:07:55","slug":"how-2-b-3leet","status":"publish","type":"post","link":"http:\/\/legacyiamsenseiken.local\/2000\/10\/28\/how-2-b-3leet\/","title":{"rendered":"how 2 b 3leet! –"},"content":{"rendered":"

how 2 b 3leet!<\/u><\/b> – you can be a hacker in three easy text
\nfiles…<\/p>\n

Let’s talk about computers for a minute. Those of us who can make them do
\ncool things generally wind up being called one of two things. Either we are
\n"Hackers<\/a>"
\nor sometimes "
Crackers<\/a>".
\nOK – we get called other stuff too, but it’s all obscene.<\/p>\n

Anyway, it is important to understand the differences and to realize that
\nignorance makes for some seriously bad law. In fact, an
international
\ntreaty<\/a> is about to happen that is extremely harmful and despite some
serious
\nprotest<\/a> it looks like it will simply become reality.<\/p>\n

\n\n\n
“Oct. 19 \u2014 A coalition of 28 international cyber-rights organizations have come out against a draft treaty on cybercrime that could broaden European and U.S. law enforcement powers online \u2014 outlawing network security tools and requiring companies to keep extensive logs of the traffic on their systems.”<\/i><\/p>\n

"The concern here is that the U.S. government is going
\n overseas to promote in whatever international forum it can find, an
\n expansion of authority that it has not been able to acquire here."<\/i><\/p>\n

[ full
\n article<\/a> ]<\/i><\/td>\n<\/tr>\n<\/table>\n<\/div>\n

The issue is the same one it always is, the government picks some group
\nalmost everyone is afraid of and proceeds to use the panic and fear generated by
\nthat group to make sweeping changes in the law – almost always to the detriment
\nof civil rights. In this case, they are looking for broad powers to invade and
\nseize data and attempt to make sure you cannot hide anything from them.<\/p>\n

\n\n\n
"The treaty even includes aiding and abetting
\n rules that appear to make the publishing of software vulnerabilities or
\n \u201cexploits\u201d illegal, according to U.S.-based cyberlaw expert Jennifer
\n Granick. That could make vulnerability mailing lists like BugTraq and
\n NTBugTraq, both with well over 30,000 subscribers, illegal, she said."
\n – full
\n article<\/a><\/i><\/td>\n<\/tr>\n<\/table>\n<\/div>\n

The problem is even more serious. It is crucial that "white
\nhats<\/a>" be able to
communicate
\ntheir findings<\/a> of vulnerabilities quickly and continue to have the tools we
\nneed to test our systems and evaluate our vulnerabilities.<\/p>\n

In other words, the only<\/i><\/b> way to defend yourself and your
\nsystems from crackers is to make sure you are as skilled as they are. This is
\nabsolutely crucial.<\/p>\n

Trust us on this<\/b>, because it’s a whole new world out there beyond your
\nmodem and if you want us to be able to protect you you simply cannot make it
\nillegal for us to have the tools we need.<\/p>\n

By the way, an excellent look into a break in and the defense against one can
\nseen online in
this
\nMSNBC article<\/a>. It gives you an excellent non-technical look at how this
\nhappens.<\/p>\n","protected":false},"excerpt":{"rendered":"

how 2 b 3leet! – you can be a hacker in three easy text files… Let’s talk about computers for a minute. Those of us who can make them do cool things generally wind up being called one of two things. Either we are "Hackers" or sometimes "Crackers". OK – we get called other stuff […]<\/p>\n","protected":false},"author":3,"featured_media":56253,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[278],"tags":[],"_links":{"self":[{"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/posts\/586"}],"collection":[{"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/comments?post=586"}],"version-history":[{"count":0,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/posts\/586\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/media\/56253"}],"wp:attachment":[{"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/media?parent=586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/categories?post=586"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/legacyiamsenseiken.local\/wp-json\/wp\/v2\/tags?post=586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}