Re: New "Hacker" Movies (to be released, or new this year)
They never actually showed the details on the voting machine hack over network television. Saying there was buggy executable instructions on the removable PCMCIA FLASH card is kinda broad. They did show the analyst running his exploit via a CLI though.
They also said there was 13 code bugs, and one potential backdoor. I'm sure if there was any crypto there was a escrow key, or sequence in it too; I think it was Triple DES. That was in one of the supposed vendor patch notes(same crypto as ATM manufacturers use ironically.)
Anyone who does serious IT work for a living, or for proactive means knows you could probably find a fleet of executable bugs in anything from a hardened install of openbsd 3.9 on a pegasus platform to the firmware on a F22 Raptor. Until someone cuts the 'red tape' of commercial engineering practices we're stuck with low level impurity's, and being creative with false assurance towards employers.
Around this time I'd usally give a credible link backing my theory(?) In this case though I lost the link. There use to be a superb software engineer/analyst that could write beholding C code, and post snippets on the net(I think I discovered him via David Wheelers secure coding page.) In any case he showed something most of the IT industry are ignorant to, and distracted from by other peoples short comings. His code barely used anything besides core code, and compiler optimizations. It taught me that a software developer can't prevent software bugs via secure coding if the underlying architecture is still flawed, but he can write dynamic instructions that adapt to 3rd party flaws on a inline lower level.
Even on modern hardened Linux systems secure code is a contradiction in terms.
I'll also refer to at this point my last post where I clearly state I post inaccurate information. It is possible to write fully functional secure software , and compile, and execute it on software that runs on top of modern hardware architecture. This is the truth, and the academic community also believes that because we can manufacture things like cell phones, and big high spec optics that we have a good idea of how the universe was created, and now works.
Even suggesting that you could implement a secure system on top of any processor architecture you care to mention would be the equivalent to me saying I could calculate the physics of dark matter around the furthest planet in the current systems with the biological mathematics behind the formula for Macdonald's special sauce.
Remember I have no idea what I'm talking about, but imagine I do long enough to take this post in to consideration.
They never actually showed the details on the voting machine hack over network television. Saying there was buggy executable instructions on the removable PCMCIA FLASH card is kinda broad. They did show the analyst running his exploit via a CLI though.
They also said there was 13 code bugs, and one potential backdoor. I'm sure if there was any crypto there was a escrow key, or sequence in it too; I think it was Triple DES. That was in one of the supposed vendor patch notes(same crypto as ATM manufacturers use ironically.)
Anyone who does serious IT work for a living, or for proactive means knows you could probably find a fleet of executable bugs in anything from a hardened install of openbsd 3.9 on a pegasus platform to the firmware on a F22 Raptor. Until someone cuts the 'red tape' of commercial engineering practices we're stuck with low level impurity's, and being creative with false assurance towards employers.
Around this time I'd usally give a credible link backing my theory(?) In this case though I lost the link. There use to be a superb software engineer/analyst that could write beholding C code, and post snippets on the net(I think I discovered him via David Wheelers secure coding page.) In any case he showed something most of the IT industry are ignorant to, and distracted from by other peoples short comings. His code barely used anything besides core code, and compiler optimizations. It taught me that a software developer can't prevent software bugs via secure coding if the underlying architecture is still flawed, but he can write dynamic instructions that adapt to 3rd party flaws on a inline lower level.
Even on modern hardened Linux systems secure code is a contradiction in terms.
I'll also refer to at this point my last post where I clearly state I post inaccurate information. It is possible to write fully functional secure software , and compile, and execute it on software that runs on top of modern hardware architecture. This is the truth, and the academic community also believes that because we can manufacture things like cell phones, and big high spec optics that we have a good idea of how the universe was created, and now works.
Even suggesting that you could implement a secure system on top of any processor architecture you care to mention would be the equivalent to me saying I could calculate the physics of dark matter around the furthest planet in the current systems with the biological mathematics behind the formula for Macdonald's special sauce.
Remember I have no idea what I'm talking about, but imagine I do long enough to take this post in to consideration.
Comment