Ask Kevin Mitnick 285
The hacker with perhaps the most famous first name around, Kevin Mitnick, has gone from computer hacking of the sort that gets one on the FBI's Most Wanted list (and into years of solitary confinement) to respected security consultant and author, helping people minimize the sort of security holes he once exploited for fun. His new book is called Ghost in the Wires: My Adventures as the World's Most Wanted Hacker; it's his first since the expiration of an agreement that he could not profit from books written about his criminal activity. Kevin's agreed to answer your questions; we'll pass the best ones on to him, and print his answers when they're ready. Note: Kevin also answered Slashdot questions most of a decade ago; that's a good place to start. Please observe the Slashdot interview guidelines: ask as many questions as you want, but please keep them to one per comment.
What has changed (Score:3)
What and how much has changed nowadays? In other words, how would a (hacker) Kevin Mitnick getting started in 2011 hack and exploit?
Re: (Score:2)
Re: (Score:2)
What and how much has changed nowadays? In other words, how would a (hacker) Kevin Mitnick getting started in 2011 hack and exploit?
Probably the same way he started back when, but using social means to get what he wanted.
Sure, he was a hacker and i'm sure he knew a thing or 2 about computers, but he used Social Engineering to get access to most systems. So is he really a hacker, or just a smooth talker?
That being said, his life was made hellish for it, though of course, he choose to run from the law, so he is a bit responsible for what happened to him.
Guilty or not, running from the law makes you guilty in their eyes. In fact, that
Re: (Score:2, Insightful)
You still don't know Microsoft. With more two decades of history behind them, you'd think people like you would learn.
The fact that you still think it's normal for an operating system to need an anti-virus program on top of it just shows how bad it is.
Re: (Score:2)
So my question to Kevin Mitnick: Can you compromise a brand new PC running updated Windows 7 and a decent antivirus?
I am nearly 100% positive you can't even come close.
You'd be incorrect, but not through any fault of Windows 7. The majority of how he hacked into systems was something like:
Receptionist at small branch office: Hi person in a suit, how can I help you?
KM: Hi I'm the VP of Finance, who you've never met but you'll be intimidated by the title, the helpdesk guys gave me a new laptop just before I left and I forgot how to log in to the corporate network, can you help me?
Receptionist: Oh, yes, anything you want to know, I'll tell you
KM: Thanks! Now enter t
Re: (Score:3, Interesting)
you are a pinhead, with no knowledge of either history or computer science. observe
- What made kevin great what this up this point most errors that were exploited were what were known as fencepost errors, tedious to find and with unpredictable behavior once exploited. Kevin was a pioneer in looking for how to leverage the functionality that made computers worthwhile against them. The man in the middle attacks that exploits a three way handshake is elegant and sophisticated because it puts the defending sys
Re: (Score:2)
He probably could - most of his attack methods used social, not technical vectors. Kevin would call your Mom/Grandmother and get her to do something that would open the patched machine.
Hey, who turned off the firewall? Comcast asked me to. They were updating my bogusmips.
Do you own a Guy Fawkes Mask? (Score:4, Interesting)
Do you own a Guy Fawkes mask, or have an opinion of Anonymous' activities?
Is it cool any more? (Score:5, Interesting)
You have gone from hacker/cracker to security consultant via quite a difficult route. If you just wanted the money, there would have been far easier ways.
Today, the most well-known kiddies tend to do something high profile but requiring little technical brilliance and move quickly to "legitimate" jobs. The majority of "security consultants" don't really have much technical knowledge at all, being more public relations/ass-covering types.
With this in mind, what advice do you have to people who like to study security for its own sake? Should they keep quiet about what they do, developing an academic career so they can research to their heart's content without commercial pressures?
Or does everyone clever sell out in the end?
Re: (Score:2)
While I'm not a big fan, one of the mustache guys from Metallica put it the best:
"Yes, we do sell out, every single time, everywhere we play."
What if they had not cought you? (Score:5, Interesting)
How do you think would have happened in a scenario where you managed to escape the FBI and the hackers that helped them?
Re: (Score:2)
Sorry for the typos. I obviously meant "What do you think" (I rephrased and didn't notice). :P
I have no excuse for mistyping "caught", however
Re: (Score:2)
Start with "cought", then move on to "How do you think would have happened..."
anonymous from home? (Score:2)
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
It depends, do you neighbours have unsecure wireless ?
As a professional white hat... (Score:4, Interesting)
What would you recommend to organizations to curtail the sort of social engineering break-ins for gaining unauthorized entry?
Re: (Score:3)
Re:As a professional white hat... (Score:4, Interesting)
Training....
... And strict enforcement of visitor policies.
You can train people all you like but if they're too scared or jaded to challenge visitors that training isn't going to count for much. Everyone at every level, especially upper management, needs to learn to understand and accept that yes, they might be called on their credentials and that this is actually a good thing.
Re: (Score:2)
Yes. Convince your targets to grant VPN access to you and to everyone else in the world, and to implement a once-a-day log deletion policy.
Otherwise, no.
Colbert Report (Score:4, Informative)
Re:Colbert Report (Score:5, Interesting)
Kevin Mitnick was recently on Colbert Report to promote his book. Here is the link [colbertnation.com] if anyone's interested.
Yeah, thats the "7 digit UID new school /."
The old school 5 digit UID and below /. crowd would have reported that Kevin was on 2600 / off the hook "recently" to promote the book. Which show was it? I donno, probably one of these:
http://www.2600.com/offthehook/2011/0811.html [2600.com]
I listened; it was a fairly interesting interview.
Somewhere in between old school and new school, he was on some TWIT network show recently too, apparently this one:
http://www.twit.tv/show/triangulation/21 [www.twit.tv]
The twit network is generally a little too non-technical / mass market for me, although they certainly easily are more interesting than TV. I think it would be hilarious if Leo purchased the "tech tv" trademark from whoever owns it using his apparently voluminous petty cash fund (if you've seen his new studio, you'd know what I mean)
Now someone else chime in with his Dr. Phil episode for that / newbie tone. thats what the 8 digit UIDs watch, or so I hear.
Re:Colbert Report (Score:4, Funny)
Re: (Score:2)
Sounds like the lower your UID the more full of yourself you are. If you had just linked the right 2600 podcast I would have modded you up just as I did the parent; but since you couldn't be bothered to link it while presenting yourself as a better community member, all you get is this AC post calling you an idiot. Congrats.
LOL. Get offended over nothing much? Possibly true, but not directly related to this. Its simply an age thing. 20+ years of experience means you've probably run across 2600 / off the hook. 10+ years of experience means you probably were introduced to uncle Leo and tech tv, later founder of the TWiT media empire. Colbert report viewer age statistics supposedly indicate I was a Z80 hacker more than a decade before colbert viewers were born (and I'm not even that old) aka noobs. With all the obvious UID
Responsible Disclosure? (Score:5, Interesting)
cybersecurity (Score:4, Interesting)
What cybersecurity threats do you see as the most dangerous to the Internet now?
Re: (Score:2)
What threat do you see as the most dangerous in 2, 5 and 10 years?
In the end... (Score:4, Interesting)
Re: (Score:2)
Was it worth it? Is there an upside to your experiences the last ten years?
Groupies? gifs or it didn't happen...
Cyberwar (Score:2)
The minor political movement surrounding your incarceration would likely not happen today. Hacking has become a state-sponsored activity, with China attacking Google and America/Israel attacking Iran.
Do you think your life would be a lot different if you were born 10 years later?
Re: (Score:2)
The minor political movement surrounding your incarceration would likely not happen today. Hacking has become a state-sponsored activity, with China attacking Google and America/Israel attacking Iran.
Do you think your life would be a lot different if you were born 10 years later?
Seems like hacking/security would be a lot different if he were born 10 years later.
Security-Convenience tradeoff (Score:5, Interesting)
Would you agree that mostly there exists a tradeoff between security and convenience? If so, how much security (or convenience) do you think is worth sacrificing for the other?
Hi Kevin (Score:2)
How did you choose your targets? (Score:2)
When you were hacking and breaking into systems, how did you decide which ones to break into? Was it because of the difficulty/ease of doing it with different security setups? Or was it because of the actual people/corporations/entities behind the servers and what they stood for?
Anon & Lulzsec (Score:5, Interesting)
What are your opinions on the actions of groups like Lulzsec & Anon? Do you feel that they will, in the end, expand freedom on the net or just help government tighten the noose on internet restrictions?
Hi, Kevin. I'm one of your victims. (Score:5, Interesting)
Hi, Kevin. I was told that my credit card information was among the thousands you stole from Netcom, way back in the day.
I won't ask you what you did with the credit card info you stole, that might cause problems with self-incrimination. I wouldn't want that, oh no.
So let me ask this: How does it feel to be a 'respected' member of the security community now, after having frightened and hurt so many people back then? How does it feel to have the hacker community regard you as a hero when you've done some of the most amoral and harmful acts in modern computing history? I guess what I'm really asking is, how well do you sleep at night? Honestly.
Re:Hi, Kevin. I'm one of your victims. (Score:5, Insightful)
The people who shouldn't sleep well at night is whoever thought credit cards where a good idea. Mitnick was responsible for 'stealing' 20k cards - they're responsible for all.
Seriously, a system where you have to give all the authorization info necessary to charge money to the company/person you're paying, and where there's only one single set of numbers, making it impossible to revoke access without canceling the whole card?
Who can trust it?
I don't know about yours, but here we have accounts where we can set up 'direct debits', which not only can have limits, but can be revoked on an individual basis without affecting the account. This is the minimum for a decent payment system.
Re: (Score:2)
The people who shouldn't sleep well at night is whoever thought credit cards where a good idea.
Good, blame the victim. Mitnick was a thief and con man. I suppose you believe that people should only do the right things when they're forced to.
Re: (Score:2)
No, I'm blaming the people who've come up and promoted the system.
I specifically said "they're responsible for all." The victim couldn't be responsible for all, now could it? At most (s)he would be responsible for one.
Re: (Score:2, Informative)
Hi, Kevin. I was told that my credit card information was among the thousands you stole from Netcom, way back in the day.
You moron.
He didn't 'steal' anything. That file with credit card numbers had been floating around for MONTHS. He was only guilty of having a copy, not for being the one who 'stole' it.
http://blockyourid.com/~gbpprorg/2600/the_world.txt [blockyourid.com]
"With regards to the credit card numbers, this is far more misleading. For one
thing, only one computer system (Netcom) had its credit card numbers accessed
Re:Hi, Kevin. I'm one of your victims. (Score:4, Funny)
Hi, Kevin. I was told that my credit card information was among the thousands you stole from Netcom, way back in the day.
I won't ask you what you did with the credit card info you stole, that might cause problems with self-incrimination. I wouldn't want that, oh no.
So let me ask this: How does it feel to be a 'respected' member of the security community now, after having frightened and hurt so many people back then? How does it feel to have the hacker community regard you as a hero when you've done some of the most amoral and harmful acts in modern computing history? I guess what I'm really asking is, how well do you sleep at night? Honestly.
Seriously, put the kool-aid down.
First, when did Kevin Mitnick get into credit card stealing? Granted it's been awhile, I don't recall that being in any of the charges against him. And if he was stealing credit card info, i would imagine that would be part of the charges against him.
Second, Netcom isn't even listed in the targets he hit.
I'm going to guess, netcom fucked up, and to save face, they blamed Kevin Mitnick, and sent everyone info saying it was him, so you'd be pissed (which you still are) at him, when he wasn't the one responsible.
So, how does it feel to be played? Twice even? Seems like Netcom screwed ya twice. Hope you got a reach around with that.
Re: (Score:2)
So I take it you didn't bother to take ten seconds to run a Google search about it before you went spouting off its falsehoods? One that would have provided numerous sources including the Wikipedia page on Netcom and, oh, about 35,199 others? (2,590 if you want to force the inclusion of "credit card" rather than simply "Netcom.")
Now I suppose it's possible that there is a decades-long, Internet-wide conspiracy to prepare for the day that somebody on Slashdot wanted to sound more clever than they are, sp
Hi, Kevin. I'm a troll. (Score:3, Funny)
How does it feel to be blamed for other people's stupidity? I mean, when someone is too stupid, or lazy, to secure their systems and allows my personal information to get stolen, how does it feel when I blame you instead of the idiot that didn't take security seriously?
I guess what I'm really asking is, when someone hides their housekey under the doormat and some thief uses it to walk into their house and take stuff, how do you sleep at night?
Honestly.
Re: (Score:3, Interesting)
So I assume that your credit card info getting into Kevin's hands caused you grievous financial harm? Oh, it didn't? Well then.
I've yet to hear about any truly harmful acts Kevin Mitnick ever "perpetrated". Maybe I just never heard about something truly terrible and destructive, but I have my doubts.
Re:Hi, Kevin. I'm one of your victims. (Score:5, Interesting)
As soon as I was told about it I canceled the card. Which was a hardship for me, considering I had just gone through a divorce and I was in bad financial straits at the time. He didn't hurt me much, but he frightened me plenty. There are others who were hurt far worse.
It frosts my chaps that this guy is treated as a hero by the hacking community. But I suppose people get the heroes they deserve. I was just wondering how Kevin feels about that.
Re: (Score:3, Insightful)
As soon as I was told about it I canceled the card. Which was a hardship for me, considering I had just gone through a divorce and I was in bad financial straits at the time. He didn't hurt me much, but he frightened me plenty. There are others who were hurt far worse.
It frosts my chaps that this guy is treated as a hero by the hacking community. But I suppose people get the heroes they deserve. I was just wondering how Kevin feels about that.
The more you post , the more you seem like a complete idiot.
Of course, your too stupid to understand, but whatever.
All Kevin ever did was show that people are stupid everywhere, and your post confirms this.
Please, I need some proof that he hacked netcom and stoled credit card info, because all I've found is some "alleged that Kevin broke into netcom and stoled credit card info" of course, it goes to say that credit card info was commonplace on the net.
So, like i said in my other post to you, you got played
Re: (Score:3)
Of course, your too stupid to understand, but whatever.
That line simply screams "Brilliant!"
But whatever.
Re: (Score:2, Funny)
So, your a furry huh?
http://en.wikifur.com/wiki/Remus_Shepherd [wikifur.com]
Oh, and a zoophile i see from what that says.
god the internet is great.
See, that person can be different from you, but now, since i suggested you were the same, people are going to think your a furry & a zoophile.
Not unlike how Netcom said Kevin Mitnick was responsible for the credit card stealing, though that is something he never did before or after and never even admitted to it later. But hell, the damage is done. You've carried a grudg
Re: (Score:2)
Re: (Score:2)
Re:Hi, Kevin. I'm one of your victims. (Score:4, Insightful)
The reason was something akin to the fact that because the DA told the judge that Mitnick had the ability to call up NORAD and whistle in the phone and cause all sorts of havoc on our defense system, part of his sentencing stipulated that he be kept away from telephones.
This is the reason prosecutors should not have immunity. Solitary confinement is torture. DA tortured Mitnick based on a completely implausible rumor. Both the DA and the judge that signed off on it belong in jail.
Re: (Score:2)
It's interesting, then, that there are over a dozen Anonymous Cowards defending him in response to my post. Sure looks like some people regard him as a role model.
Look, this incident was a long time ago and I've recovered completely from it both emotionally and financially. I just hate seeing the idol worship of bad people. Kevin Mitnick is a bad person. He shouldn't be given a Slashdot 'Ask' thread, he should be shunned. His bad reputation damages all those who associate with him, and Slashdot is open
Computer Setup (Score:5, Interesting)
What is your computer setup? I mean hardware, OS, software you use to work.
Current opportunities in software (Score:2)
What do you think the biggest opportunities for software businesses will be in the next five to ten years?
SSA (Score:5, Funny)
Has the gal from the Social Security Administration claimed her kiss? if so, was she hot?
Re: (Score:2)
LOL, please someone mod this up
What would you do to yourself? (Score:2)
How would you proceed if someone broke into your company and managed to download your company's most sensitive information, and what (if anything) would you tell your clients if, for example, their sensitive info got leaked?
ham radio license? (Score:2)
Are you going to fight to get back your ham radio license or is that all water under the bridge now?
Cybersecurity Companies (Score:2)
Re:Cybersecurity Companies (Score:5, Insightful)
I've worked for two of the major AV companies. In both cases, there were enough controls in place that, if it was financially happening, it would have become known. Even if you could have hidden the financials, if there was any sort of "collusion", someone would have leaked hard evidence by now, if only for the notoriety. Your paranoid imagination is just that.
The bottom line is that malware writers don't need the help. Think of it as information pollution. A manufacturer "saving" a few thousands per years in dump fees can cause a mess that costs millions to clean up. The malware writers' desires to get their botnets up and running to provide themselves collectively with a few million dollars per year are all of the incentive needed to produce the mess that requires billions in prevention and cleanup.
Re: (Score:2)
A question & follow-up (Score:4, Interesting)
What is the primary purpose of hacking? Has this purpose remained constant over the decades, or has it changed from your rise as a hacker up to today?
Why wait? (Score:5, Interesting)
TFA Asserts that "Mitnick has agreed that any profits he makes on films or books that are based on his criminal activity will be assigned to the victims of his crimes for a period of seven years following his release from prison." The summary asserts that this is the reason you chose to wait before arranging for the publishing of a personal autobiography.
Given you had the opportunity to publish a copyrighted work and sell it for a profit prior to the release of your "official autobiography" under the pretense that the profits would be sent to the victims of your crimes (a number of which included theft of trade secrets and violation of copyright), why have you chosen to wait until the end of the agreement so that you could personally profit from this? And in a related question (unless you have answered it in the first), do you believe all of your crimes were vitcimless, some were, or perhaps none were?
Re: (Score:3)
Well, given how much he already suffered for his crimes (e.g., eight months in solitary confinement) and how much scumbaggery there was against him during his prosecution, I don't think he feels much sympathy for his victims. For example, from his previous answers to /.:
Federal prosecutors simply added up all the R&D costs associated with the source code I had accessed, and used that number (approx $300 million) as the loss, even though it was never alleged that I intended to use or disclosed any source code. Interestingly enough, none of my victims had reported any losses attributable to my activities to their shareholders, as required by securities laws.
Still, if the money from this book had any chance to repair any real damage he did in any meaningful way, I'd agree that it would be descent to publish earlier. I don't think would, though, and I think it's pretty clear that neither does he.
Re: (Score:2)
Wow, not sure how it happened that my question got pretty close to the top 10 in this thread... Was his book really that good that no one is curious about Kevin anymore? Anyway, if this question does get picked, let me add that I asked it out of sincere curiosity and while it sounds like I am trolling I am genuinely interested in knowing what Kevin's perspective is like as someone who has been on both sides of "intellectual property".
"Justice"... (Score:2)
Looking forward to reading your book.
Did you meet other hackers in prison (Score:2)
Did you meet and hang out with other hackers in prison? I mean others who served time for computer related crimes similar to your own? Or did you make friends with any sort of people? Even non-nerds?
Re: (Score:2)
Did you meet and hang out with other hackers in prison? I mean others who served time for computer related crimes similar to your own? Or did you make friends with any sort of people? Even non-nerds?
Do lower security prisons have 2600 meetings? Obviously not the 23-hours-per-day-lockup prisons but more like the "office space" "country club" minimum sec places?
Re: (Score:2)
He shard a cell with Gregory Evans, how claims to be the worlds greatest hacker. It turns out most security experts consider him a fraud, but to answer your question he did share a call with someone who now claims to be a security expert, and who is the CEO of a security company.
Mitnick is a creation of the media.. (Score:2)
Nothing more, what he did was worth (at most) one year in minimum security and a ruinous fine! The fact that the posturing, corrupt little villains in law enforcement chose to exploit this for their own personal aggrandizement just highlights the failings of the (so called) "Justice" system!
Volte face (Score:2)
Have you ever... (Score:4, Funny)
Morality and Ethics and stuff (Score:2)
A good friend of mine insists that your past behavior was due to a lack of certain ethical / moral regions in your psyche, in comparison, I think its more like a different orientation of ethical / moral beliefs rather than an outright lack of certain areas. So what is your philosophical reflection on why you did what you did?
In simpler terms, were you naughty because you didn't stop to consider if it was naughty or not, or were you naughty because in your judgement at that time it was overall the right thi
"Most famous first name"? (Score:2)
Wow, some /. writer has a bit of a man-crush on Mr. Mitnick...
Even if you mean just "most famous first name in the computer security field", I would argue that the only reason his first name is famous is because people know what it is. There are many more (current) computer security hacktivists whose online pseudonyms are well known: GeoHot, comex, etc.
I work at a computer security company, yet if I were to say "Kevin" to someone, Mr. Mitnick would *NOT* instantly spring to mind.
And as timothy does not spe
Re: (Score:2)
As in, the only reason he's famous is because he was caught, not because he was actually "good". Many other "better" hackers (used in the proper meaning) have their first name unknown. (Okay, in the case of GeoHot, it's known, but it's GeoHot that is more commonly know.)
Here's an easy one Kevin... (Score:2)
.
Who am I and where is my car?
.
Breach of Rights (Score:2)
Did you / have you brought any legal actions for the breach of rights committed in the pursuit and eventual arrest of you? Do you feel the violations were similar to ones now being taken against "terrorists"?
Anonymity (& privacy) (Score:2)
Why did you never go after Microsoft? (Score:2)
Still got the fire? (Score:2)
Gaming? (Score:2)
Most "hard core computer people", or whatever you want to call them, have some gaming interests.
So, what is it, minecraft, dwarf fortress, WoW, DnD online, obscure programming languages not fit for production like brainf*ck or intercal or java (just kidding about the last one... or maybe not), anyway what wastes your time? Or do you still do "analog" gaming like ESR does?
Personally, I do hex-based-wargames, text adventures, non-FPS RPGs, and simulations (xplane, civ, etc). There's a lot more out there tha
What's your /. UID? (Score:2)
Deus Ex Inclusion (Score:2)
In the new Deus Ex game, set in 2052, as you are infiltrating a rogue Chinese company the main character discovers that the Chinese company hired a 'penetration expert' named Kevin Mitnick? The expert does not appear in the game, but you are able to read emails from 'Kevin Mitnick'. How do you feel knowing you'll be successfully hacking for pay 40 years from now? Or more seriously, how do you feel about being included in the game this way?
Re: (Score:2)
Screenshot from the game http://steamcommunity.com/id/apc17/screenshot/540651622691231829 [steamcommunity.com]
Re:Deus Ex Inclusion (Mod parent up!) (Score:2)
Crossing Paths (Score:2)
Kevin,
Every time I see your name mentioned in an article written by Kevin Poulsen, I wonder how many people reading it know the connection. Do you have any interesting stories of crossing paths with someone your knew from your "ghost in the wire" days, or unexpected relationships you've developed or continued with people who either impacted your life, or were impacted by your actions back then?
Social engineering too effective to fight? (Score:2)
Hi Mr. Mitnick,
Is there an amount of security that would stop a gifted social engineer like yourself, and if so, how much would it typically cost a Forbes 500 company?
Read your book, it was quite entertaining and informative!
Shimomura & Markoff (Score:2)
Did you ever make peace with Tsutomu Shimomura and/or John Markoff?
Why do you call yourself a Hacker? (Score:2)
Or allow others to call you that?
You are a cracked, not a hacker. And at that, you are just a script kiddie. You haven't ever found a single vulnerability, and you haven't developed a single exploit. You relied on social engineering and script-kiddie techniques.
Why do you give Hackers a bad image? Certainly the figure of a script-kiddie who has done obvious attacks, was quickly discovered, ran away, was found and served prision time, then used his fame to make money as a security consultant, is incompatible
what was the biggest (Score:2)
How do you feel? (Score:2)
You were obviously a celebrity /then/ - no one can forget "Free Kevin!"
How do you feel about being a celebrity /now/? Your name is used in the most recent Deus Ex game, and you're in the Internet exhibit at the Museum of Science and Industry in Chicago.
Re: (Score:3)
Huh? If they're dead, what's the problem? It would be much more evil to steal the identities of living people. If he killed the infants to steal their identities, then I think you'd have a point.
(Note: I don't actually know anything about this guy or what he did)
Re: (Score:3)
Mitnick made his way by stealing the personal identification of *dead infants*. He's a sociopath.
Maybe if he stole them for shits and giggles, but the identities of dead infants have two significant properties: They're real identities and they're not in use. If there was another class of people with the same or better potential for clean identity theft, he probably would have stolen their identities too.
Re: (Score:2)
If there was another class of people with the same or better potential for clean identity theft, he probably would have stolen their identities too.
I was watching "I [almost] got away with it" on TV the other day, and the perps solution to identity theft was rather low tech. He befriended homeless people who looked similar to himself, and stole physical SSN documents from them. Then he went and got legit drivers' licenses etc
Re: (Score:2)
Is it really possible to hide your online activity, keeping in mind that the enemy has the most advanced tools and computers to filter the traffic, and pinpoint your exact physical location?
To expand slightly on the above question, I think the "enemy" in this case needs to be properly defined. Is it a Corporation or the Government? If Government, which Government? (IE I don't think China would give the NSA / CIA access to their backbone routers to start monitoring traffic).
With that change, How do you suggest we as citizens of the net go about to protect ourselves properly? How can a whistle-blower be safe in today's connected world?
Re:Will the authorities ever understand (Score:4, Informative)
Re: (Score:3)
Right - "I wasn't in her house to rob her, I just wanted to see what was in her fridge and see what kind of undies she liked."
Re: (Score:2)
Lotus Notes is still around? *crunching on my VisiCalc spreadsheet*
Re: (Score:2)
related: have you met Bubba ( from infamous BSA posters ) in prison and was it a painful meeting?