Welcome, Guest. Please login or register.

Author Topic: viruses and hashes  (Read 2575 times)

Description:

0 Members and 1 Guest are viewing this topic.

Offline Linde

  • Sr. Member
  • ****
  • Join Date: Mar 2004
  • Posts: 457
    • Show all replies
    • http://hata.zor.org/
Re: viruses and hashes
« on: August 28, 2014, 03:49:21 PM »
Quote from: Minuous;771859
You're joking, right? You want people to help the NSA in their mission to erode our freedoms?


NSA? How are they involved in this project and how will they erode our freedoms using checksums?
 

Offline Linde

  • Sr. Member
  • ****
  • Join Date: Mar 2004
  • Posts: 457
    • Show all replies
    • http://hata.zor.org/
Re: viruses and hashes
« Reply #1 on: September 01, 2014, 08:21:10 PM »
Quote from: Minuous;771910
I shouldn't really need to explain this, it is written there on the site in black and white:



"The RDS can be used by law enforcement, government, and industry organizations to review files on a computer by matching file profiles in the RDS."

Sorry, I'm still not sure how NSA is involved in this project. Much like any open information, yes, it can be used by industry organizations, law enforcement and government.

The information the list contains is not personal, it's not secret, and collecting it is a trivial job. The potential use of it to infringe upon personal rights is similar to that of a shoe -- a pretty useful tool for all sorts of things, but sure, you could figure out a way to hurt someone with it.

Quote from: Minuous;771910
"This will help alleviate much of the effort involved in determining which files are important"

Clearly it is intended for mass remote surveillance, they're not even bothering to hide the fact. Once upon a time (pre-Snowden) that viewpoint might have been considered paranoid...but not anymore...


You're making quite a leap there. This information is about as useful in mass surveillance as super soakers are in fighting wildfires. The NSA likely use more sophisticated file signatures than a bunch of rigid checksums in a list that is updated less than once a month. More importantly, they probably focus more on what is being communicated over networks than what legitimate software is installed on a person's computer. The part that you quoted but cut off before it contradicted your conclusion puts the likely use of this in law enforcement quite well: "This will help alleviate much of the effort involved in determining which files are important as evidence on computers or file systems that have been seized as part of criminal investigations." A seized computer is often scanned for documents, and identifying the software installed can greatly narrow the search for those without the budget for more sophisticated means.

The way software update cycles are nowadays, the worst I can see in this list is a waste of money and effort.
 

Offline Linde

  • Sr. Member
  • ****
  • Join Date: Mar 2004
  • Posts: 457
    • Show all replies
    • http://hata.zor.org/
Re: viruses and hashes
« Reply #2 on: September 01, 2014, 08:42:40 PM »
Quote from: orange;771908
my guess is he thinks we might one day be forced to use 'whitelist' only software. something like that TPM thing. but that horse left the stable long ago. people want freedom.

This is extremely unlikely. There exists loads of software and hardware that would make this impossible to enforce.

Quote from: orange;771908
or, perhaps, that a 'government approved' virus would be listed.

The people who work with identifying viruses know better than to base their assessments on information provided by a government agency. The government agency that could produce such a virus would know better than to design it in such a way that its hash would be consistent. Having viruses modify themselves while executing to avoid naive content based identification has been an established technique for a long time.