Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Censorship

Blackboard Campus IDs: Security Thru Cease & Desist 853

On Saturday night, Virgil and Acidus, two young security researchers, were scheduled to give a talk at Interz0ne II on security flaws they'd found in a popular ID card system for universities. It's run by Blackboard, formerly by AT&T, and you may know it as OneCard, CampusWide, or BuzzCard. On Saturday, instead of the talk, attendees got to hear an Interz0ne official read the Cease and Desist letter sent by corporate lawyers. The DMCA, among other federal laws including the Economic Espionage Act, were given as the reasons for shutting down the talk (but -- update -- see the P.P.S below). I spoke with Virgil this morning.

Virgil was there two years ago when Dmitri Sklyarov was arrested and led away in handcuffs at Def Con 9. He's not in handcuffs now, but in speaking to me, he had to stop and think about everything he said, and every third answer was "I really shouldn't talk about that."

The DMCA is largely to thank for that. Section 1201 states that no one "shall circumvent a technological measure that effectively controls access to a work," and that no one "shall... offer to the public... any technology" to do so. Blackboard Inc., whose card system is called the Blackboard Transaction System and known to end users under various names, uses a network of card readers and a central server, and they communicate over RS-485 and Internet Protocol -- using, or so they apparently claim, measures that effectively control access.

For the record, none of what I learned about the Blackboard technology was from him or Acidus after the restraining order was sent. I spoke to other people, who have not been served with a restraining order. Google has a less enlightening mirror of the slide titles from this weekend's PowerPoint presentation and a more enlightening mirror of Acidus's "CampusWide FAQ" from last July. And, most enlightening of all, this mirror has an updated version with details on what they figured out how to do and what their talk was going to be about (click "CampusWide" for the text description, the PowerPoint slides, and Acidus's timeline of the last year).

At many schools, Blackboard's system is the ID: you swipe your card for your meal plan at the cafeteria, to get into your dorm, maybe even to get your final exam.

A swipe at a vending machine will get you a soda -- a money transaction from your campus debit account. When you use a swipe to do laundry and make copies, money has to be involved. Blackboard even notes that they can set up a merchant network on- and off-campus: "a cashless, safe, and secure way to transact on and around campus while offering parents the assurance that their funds will be spent within a university-approved network." (Emphasis added. Maybe readers who go to schools that use such a system can expand on how that system is used.)

The kicker, of course, is that this network is not very secure, or at least Blackboard doesn't think it's as secure as... well, as lawyers. One anonymous Slashdot submitter wrote that: "The authentication system is so weak that [Virgil and Acidus] have been able to create a drop in replacement for the CampusWide network debit card readers used on coke machines on campus."

Virgil couldn't provide me any details about what he had learned about the system. Based on the mirrors, it looks like a man-in-the-middle replay attack -- which is a pretty simple attack, repeating messages sniffed over the RS-485 protocol, or even over IP -- can have effects like convincing a Coke machine to dispense free product. Or, it's claimed, the attacker can create a temporary card, with no name attached, and free money in its account. Hmmmmm.

Or, more ominously, someone else's identification might be sniffed, and then replayed from a security terminal. If a thief gained entrance to a building by sending the message "open the door, my name is John Doe," the real John Doe might be sorely inconvenienced the next morning.

So, if you're a student at a school that uses Blackboard, do you feel more secure now that the DMCA has tried to stop you from learning about its security flaws?

If you're a parent putting money into a Blackboard-based debit account, do you feel more confident of its safety now that this information is ostensibly hidden?

This card system has been installed on many campuses and its roots go back almost twenty years. My guess is that replacing the card-reading hardware would be necessary to improve the security of these devices. Obviously, Blackboard would be hard-pressed to replace thousands of hardware devices at all its locations, even if they'd started in late 2001 when Acidus claims he called to tell them of the flaws he'd found (and "was blown off").

So, assuming that's not possible -- is the DMCA a viable tool to ensure security?

P.S. Virgil tells me that he has a good lawyer. They are scheduled to argue on Thursday that the restraining order not be made permanent. Slashdot will keep you apprised of what happens in our Slashback stories... stay tuned.

P.P.S. Update: 04/15 02:30 GMT by J : Now online are the restraining order, which just lists the six things that Acidus and Virgil are not to do, and the more detailed Complaint. Now that these are available, as Declan McCullagh points out, it turns out the DMCA was only in the lawyers' threatening letter and not considered as part of the Complaint itself. I'm not sure why it would be included in the letter -- some of the language of the Georgia Computer Systems Protection Act is similar, and who knows, Section 1201 might be mentioned later on, as this case progresses. Maybe the lawyers are just keeping their options open. Meanwhile, I love this part of the Complaint:

"Mr. Hoffman openly acknowledges on his website that 'I am a hacker.' His website then defends the process of hacking. See Exhibit B."

This discussion has been archived. No new comments can be posted.

Blackboard Campus IDs: Security Thru Cease & Desist

Comments Filter:
  • by RLiegh ( 247921 ) on Monday April 14, 2003 @02:17PM (#5730091) Homepage Journal
    This in NO WAY implies we live in a police state.
    • No, it doesn't. (Score:3, Interesting)

      by Anonymous Coward
      A corporation is preventing you from doing something, which is their right according to law.

      If we lived in a police state, armed thugs would not tell you, "You can't detail the flaws of our product." They'd just beat the living crap out of you and then go home, kick back, and drink a cold Coors 20 ouncer.
      • Re:No, it doesn't. (Score:4, Interesting)

        by nehumanuscrede ( 624750 ) on Monday April 14, 2003 @02:36PM (#5730276)
        A corporation who distributes flawed merchandise or software has every right to tell me to be quiet. I also have every right to a functional secure product that they claim to be pawing off on you. Perhaps hitting the corporation with a false advertisement lawsuit ( we sell a secure product, we swear ) in return would wake them up. ( Doubtful ) With our sorry ass congress/senate passing these bills as fast as they can, it's probably our only recourse until we boot the entire lawmaking body out of office and get someone with some sense.
        • Re:No, it doesn't. (Score:5, Insightful)

          by nehumanuscrede ( 624750 ) on Monday April 14, 2003 @02:46PM (#5730377)
          Think of America as the 'politically correct' police state. While the jackbooted-gestapo isn't kicking the door down and beating you. . . (yet) . . . they are instead getting law degrees, dressing in nice suits and suing you. It's much more profitable. It ultimately achieves the same goal. You tend to keep your opinions / comments to yourself.
        • Re:No, it doesn't. (Score:5, Insightful)

          by mickwd ( 196449 ) on Monday April 14, 2003 @03:22PM (#5730707)
          The trouble is, how can you win a false advertising law suit it no-one is prepared to do the research to find the product is insecure ?

          Interesting, isn't it, in these days of terrorism paranoia, that laws like this ARE going to result in worse security ? Well worse security for the USA, relative to every other country in the world that doesn't (yet) have these sort of laws.
          • Re:No, it doesn't. (Score:5, Insightful)

            by berzerke ( 319205 ) on Monday April 14, 2003 @05:12PM (#5731605) Homepage

            ...laws like this ARE going to result in worse security...



            My thoughts exactly (for quite some time now). The true criminals won't care it's illegal. They will get and USE the information anyway, leaving someone else to take the blame. (Honest officer, it wasn't me who swiped the card to break into the dorm and rob people.) And since the system is <sarcasm> so secure</sarcasm>, who's going to believe the victim? Of course, defending yourself without access to the information that shows how insecure the system really is is going to be a <sarcasm>cake walk</sarcasm>.



            It's been my experience (and looking at history, I'm not alone) that trying to ignore a problem (bring in the lawyers!) only makes it worse and more expensive. Sadly, common sense seems so uncommon nowadays.

        • Re:No, it doesn't. (Score:5, Insightful)

          by geekoid ( 135745 ) <{moc.oohay} {ta} {dnaltropnidad}> on Monday April 14, 2003 @04:10PM (#5731116) Homepage Journal
          " A corporation who distributes flawed merchandise or software has every right to tell me to be quiet."

          but that doesn't mean you should have to respect that wish.
          How many things only get better because someone talks to the press?
      • Re:No, it doesn't. (Score:5, Insightful)

        by Anonymous Coward on Monday April 14, 2003 @03:39PM (#5730842)
        Hello. Stupid. The corporation is using the law to prevent speech. The law is stopping someone from speaking. A prior restraint, stupid. This is the hallmark of a police state -- laws being used to silence the voice of individuals. Armed thugs will beat the shit out of him if he speaks -- they will attempt to kidnap him, imprison him, and extort money from him for this sin in the guise of arrest, detention, and fines by the police and court system. You have no idea what you are talking about, AC.
      • by g4dget ( 579145 ) on Monday April 14, 2003 @06:25PM (#5732100)
        If we lived in a police state, armed thugs would not tell you, [...]They'd just beat the living crap out of you and then go home,

        Maybe that's how police states work in your native, ignorant, Hollywood view of the world. In real life, police states don't usually bother with beating people up--it's way too much effort--and it's not necessary. They control people through implicit and subtle threats to their liberty, livelihood, and privileges, as well as similar threats to their families. They only resort to force when people absolutely don't comply--but so does law enforcement everywhere.

        You don't agree with the party line? Sorry, you or your kids can't go to college. You don't return from your trip abroad? Well, to compensate the state for your misdeeds, your home will be confiscated; too bad about your family. In some areas of US law enforcement, it's getting frighteningly close to that (drug seizures, computer seizures, etc.).

        Police states aren't anarchies. They operate orderly and according to laws, they just happen to be laws that limit freedoms excessively. And it's very easy to move from the rule of law in a free society to the rule of law in a police state.

  • by Marx_Mrvelous ( 532372 ) on Monday April 14, 2003 @02:17PM (#5730093) Homepage
    I wish there were a way to accidentally leak the exacty details overseas. There, it would be very difficult to get shut down, and every college using this system would have to deal with it.

    While this may be an inconvenience to students, they can get by without buying coke with a swipe of a card for a while.
    • by Jeffrey Baker ( 6191 ) on Monday April 14, 2003 @02:19PM (#5730118)
      It is trivial to leak this kind of information. Walk into an internet cafe (or walk by any of millions of open 802.11b network) and upload the information to USENET. Problem solved.
      • by Anonymous Coward on Monday April 14, 2003 @03:27PM (#5730743)

        Ah, I've often shouted "POST IT ON USENET!" at the television screen whenever there's a movie or x-files/whatever episode where the hero is running away with the evidence/HotInfo trying to keep it from the Evil Conspirators.

        They almost never do.

      • by Kilbasar ( 617992 ) on Monday April 14, 2003 @04:00PM (#5731032)
        The problem is that uploading the information to usenet is exactly what's going to happen. Corporate-types don't read usenet, but hacker-types do. What does that lead to? Some bored kid stealing all of my money, and only THEN is there a reaction from the company. I attend Cornell University, and I have to say, Blackboard is EVERYWHERE. We call it CornellCard. It controls all of the vending machines and meal plans. At least one door on each academic building and all the doors on the newer dorms are controlled by it. Not only can it be used to charge money out of our debit account (called Big Red Bucks), but it can be used to charge however much you want to your parents' bursar bill. The card isn't the only product Blackboard provides to schools. They also sell Cornell a web service called MyBlackboard. It allows teachers to set up websites for their classes. In addition to trivial stuff like assignments and lecture notes, the teachers use this interface to post test scores. Imagine all the havoc that could be brought upon this huge system simply because some exec decided it was more "cost-effective" to send out the attack lawyers than to fix their shoddy product.
      • by jonadab ( 583620 ) on Monday April 14, 2003 @04:09PM (#5731110) Homepage Journal
        Indeed. If they'd just thrown the information onto usenet in the
        first place, no lawyer action would have had any effect at all.
        The problem is, people[1] who find security flaws don't generally
        *want* to post them to usenet: they want to work with the vendor
        and the security community to get the problems _fixed_.

        So here's the question: will these sorts of responses from vendors
        force the security community into just giving up on all pretenses
        of working with the vendor and just leaking everything to the
        general public immediately upon discovery? That would be bad for
        all concerned, but it might be better than being lawyered to death.
        It's pretty easy to arrange to get something posted to usenet
        with a reasonable degree of anonymity, and there's absolutely no
        way to suppress anything that has been posted to a big-8 or alt
        group, short of destroying the whole planet. But I don't think
        I trust the security of a product whose vendor is sufficiently
        uncooperative as to motivate a discoverer[1] of a vulnerability
        to do things that way.

        Maybe people who discover such vulnerabilities should discreetly
        communicate everything they know to some third party overseas
        first before doing anything else...? But you still have the
        problem that if you try to work with the vendor they know who
        you are and can laywer you, and you can be held responsible for
        communicating the information to the third party.

        Ah... but what if the original discoverer remained anonymous
        and communicated to someone _else_ who would try to work with
        the vendor, and if that failed the original discoverer or some
        third party he communicates with could release the information
        to the security community (and, in the process, the general
        public)? This would be harder for the discoverer, who would
        have to anonymously contact a trusted third party in the first
        place whom he would have to trust to make a good-faith attempt
        to work with the vendor. But if the vendor tried to laywer
        the non-anonymous person, they'd run into "I just found out
        from this here anonymous email and was trying to work with
        you; this leak must have been perpetrated by the evil person
        who circumvented your effective measure in the first place,
        probably the same dude who sent this email, which seems to
        have come to me from an evil open relay in southeast Asia,
        one of the same ones the spammers use to send me special
        offers for reduced-price copies of your products, which they're
        probably pirating. Gosh, you should really go after those
        open relays, they're all kinds of trouble."

        [1] Security people, I mean. I'm not talking about blackhats.
    • by Marx_Mrvelous ( 532372 ) on Monday April 14, 2003 @02:23PM (#5730146) Homepage
      Now of course, I wouldn't have had this reaction if the company had taken steps working with the discoverers of the security flaw. If anything, they should hire/pay these researchers for their work, fix the problem, implement it, and then publish what went wrong. And who knows, maybe they even tried. I doubt it though, when a cease-and-desist can have the same effect.
      • by gl4ss ( 559668 ) on Monday April 14, 2003 @02:41PM (#5730329) Homepage Journal
        chances are that they knew _exactly_ how bad the system was, and maybe just hadn't care when they first made the system, maybe thinking that it would be such niche system or so it wouldn't need to be secure, or maybe it was some other system adapted to use where security would have paid off..
      • by archeopterix ( 594938 ) on Monday April 14, 2003 @02:50PM (#5730415) Journal
        Now of course, I wouldn't have had this reaction if the company had taken steps working with the discoverers of the security flaw. If anything, they should hire/pay these researchers for their work, fix the problem, implement it, and then publish what went wrong. And who knows, maybe they even tried. I doubt it though, when a cease-and-desist can have the same effect.
        Sadly, the reaction of Blackboard is a big hint to the future discoverers of security flaws: don't even try to contact the company - wear gloves, attach a fake beard, go to an internet cafe, publish your exploits on Freenet, Usenet, foreign haxx0r sites and whatever else comes to your mind, grin evilly (this part is optional).
      • by skillet-thief ( 622320 ) on Monday April 14, 2003 @02:52PM (#5730433) Homepage Journal
        The same kind of thing happened in France. (Maybe it was on /., it was a few years ago...)

        A guy figured out how to manipulate the chip on the smart cards used for credit cards. He contacted whatever company makes the cards to try to get them to hire him. They didn't believe him, so to prove his point he bought about $7.00 worth of metro tickets from an automatic distributor.

        And then what?

        They busted his ass big time. I think it totally destroyed the guy's career, life, etc. Then the company upgraded their encryption...

    • by Acidic_Diarrhea ( 641390 ) on Monday April 14, 2003 @02:24PM (#5730158) Homepage Journal
      Why isn't there a way? It seems like it wouldn't be that hard to drop a .pdf file onto a p2p network (call it how_to_get_coke_for_free_at_school.pdf) and watch the downloads begin. The point is that by doing it in this manner, the flow of information is limited to those people who are tech-saavy enough (I know, I know - you wouldn't have to know very much to download and view a .pdf file) to get the file. This prevents many of the people who really need this information, the administrators and parents, from getting it. The college kids can still find out because they've grown up with computers but the people pulling the strings won't know their system is insecure because their knowledge of computers starts and stops with Solitaire.
    • by Anonymous Coward on Monday April 14, 2003 @02:25PM (#5730165)
      I wish there were a way to accidentally leak the exacty details overseas. There, it would be very difficult to get shut down, and every college using this system would have to deal with it. While this may be an inconvenience to students, they can get by without buying coke with a swipe of a card for a while.

      Yeah, I wish we had some sort of global communication network where you could instantly and anonymously post a piece of information, and people anywhere in the world could see it. Wouldn't that totally rock?
      • Hey! (Score:5, Funny)

        by Grendel Drago ( 41496 ) on Monday April 14, 2003 @02:36PM (#5730283) Homepage
        How come we can post Win2k3 serial keys in the slashdot forums, but no one posts how to get phr33 as in c0ke c0kes? Sheesh. What bullshit.

        Come *on*, someone toss a practical exploit in here!

        --grendel drago
    • by orthancstone ( 665890 ) on Monday April 14, 2003 @02:25PM (#5730166)
      Well, going to a school where all my food is purchased by cards and the only way I can get back to my room is controlled by cards, I'd say your statement of "deal with it" is quite silly.

      It is sad to see that the DMCA can be used by a company if it wishes to ignore flaws. It is a sad day knowing that profit is more important than a good product.
      • by NaugaHunter ( 639364 ) on Monday April 14, 2003 @02:52PM (#5730434)
        Profit has long been more important than a good product. The sad part now is corporations have a law to prevent consumer groups from researching their flaws.

        Does it bother anyone else that copyright violations are given more attention than violent crime? Why can't the same reasoning the vilifies P2P networks since they "could" be used for illegal copies be applied to manufactures of Dum-Dum bullets, Assault rifles, etc.?

        Before rants go off-topic both ways, I'm trying to point out the absurdity of the anti-copyright measures when compared with how other crimes against individuals and not corporations are treated. Laws are being crafted that protect corporations, at the expense of individual rights. My right to not get shot should be a lot more important than a corporations right to make money

        (For the record, I'm not against guns in principle - I'll eat hunted meat, etc. I just don't think you can get a good set of steaks if you hunt with an assault rifle, nor is it really sporting, so I don't see why normal people need them. And in today's world the 'standing militia' argument no longer holds - if our armed forces can't hold off an invasion, we're pretty much boned. You'd have to have lots of forces to be able to get a supply chain for more ammo, and if I remember correctly WWI proved you can't really hold the ground without air superiority, so you'd better build an air strip as well.)
        • by runderwo ( 609077 ) <runderwo.mail@win@org> on Monday April 14, 2003 @03:02PM (#5730521)
          And in today's world the 'standing militia' argument no longer holds - if our armed forces can't hold off an invasion, we're pretty much boned.
          The right to organize militia is not intended for defense against foreign invaders; rather, it is to be a defense against a tyrannical government that has gone berserk.

          Sure, that might not happen, a lot of things might not happen; but it's silly to simply throw away one of the most important checks that individual citizens have on the federal government's power, just because there are some idiots out there who are mentally incapable of possessing a weapon without doing harm to innocent third parties.

          By eliminating the right of individual citizens to bear the same firearms that soldiers do, you save a few lives in the short run, and you set us up for a bloody revolution in the long run, when the government decides it's had enough of that "freedom" thing.

        • With regards to the 'standing militia' comment. You are making a big assumption that the only threat to our freedom will be external.
    • by dnoyeb ( 547705 ) on Monday April 14, 2003 @03:11PM (#5730611) Homepage Journal
      Why not flip the proverbial script.

      Just announce that the product has a MAJOR and EASILY EXPLOITABLE security flaw. Then absolutely _refuse_ to give any details on it to the company. Cite fear of the DMCA [and numerous examples] of its enforcement as your reasoning. (+5th amendment)

      Watch their stock take a pounding, and see if they don't fix it themselves. Then they will have to hope you come out and say they fixed it.
      • by Pharmboy ( 216950 ) on Monday April 14, 2003 @03:39PM (#5730839) Journal
        To comment on your comment, my solution would be somewhat different.

        My solution is pick one university, find a specific solution, and have about 1000 people get free cokes, free lunches, free access, all on one particular day only. Create a financial incentive, but more importantly a social incentive to open up the conversation.

        I am NOT a big fan of breaking the law purely for protest means. (see my many other posts on this subject) However, considering the DMCA itself is a violation of free speech, it may be warranted. Not to rip off large amounts of money, or do serious damage, just nickel and dimed for ONE day where it is OBVIOUS that it is a security breach that can not be overlooked. Then do what you suggested, say you can't tell them how it was done due to DMCA. ('you' being someone who didn't participate but knows how it was done)
    • by Dr_Marvin_Monroe ( 550052 ) on Monday April 14, 2003 @03:31PM (#5730769)
      ..anything, why you usta hafta put coins in....

      that's right, you young whipper-snappers are giving up something up by "swiping" rather than having to DIG for coins!

      The major concern here is about your PRIVACY as you swipe...where's the identity on these cards going?

      Free laundry and coke is cool, but I mastered the "quarters on dentalfloss" technique myself...If you are giving all your personal info away at every swipe, there's something wrong.

      You should reconsider what you are doing, or at least send me your checking acct#.
    • by Alan Cox ( 27532 ) on Monday April 14, 2003 @04:38PM (#5731356) Homepage
      Just why are people still holding security conferences in the USSA ? Is it going to take a conference chair being thrown into jail before the lights go on and people move them to a sane nation ?

      Still another fine example of the DMCA at work, protecting the right of corporations to ensure that even the daftest of terrorists can break US security, and stop for a free canteen lunch on the way.

  • Duh... (Score:5, Insightful)

    by c0dedude ( 587568 ) on Monday April 14, 2003 @02:18PM (#5730099)
    Well, if you aren't even able to TALK about security flaws *Cough*First Amendment*Cough* they'll never get fixed. The DMCA again makes the net less secure instead of more.
  • silly response (Score:4, Insightful)

    by adamruck ( 638131 ) on Monday April 14, 2003 @02:18PM (#5730101)
    oh good, possible security hole found in card readers

    solution1) talk about it and develop a fix
    solution2) send cease and decist letters to people who could possibly fix the issue, and rely on security through obscurity

    solution2 seems kinda silly to me..
    • Re:silly response (Score:3, Insightful)

      by evilviper ( 135110 )
      Actually solution2 isn't completely a bad thing as long as it is only a short-term, temorary measure, until a fix can be finished. Then solution1 would be perfectly okay.

      Unfortunately, the DMCA doesn't give any rights to the public at all. You do not talk about security flaws. Go ahead and exploit them, just don't talk about them.

    • Such things are doubleplusbad.
    • Re:silly response (Score:5, Insightful)

      by st0rmshad0w ( 412661 ) on Monday April 14, 2003 @02:35PM (#5730273)
      Hmmm, they had better go with option 1.

      Given solution 2, how about this scenario. While C&D is in force and no one is implementing a fix, all users of the systems still remain vulnerable. Someone else figures out how to fake the ID's, uses said fake to gain access to student's dormroom, and commits serious crime against student. Student's parents sue college, college FREAKS and looks to point a finger, original objects of C&D step forward with evidence that security company was informed of the problem and offered help with a solution. College and student's parents sue security company into non-existence.

    • oh good, possible security hole found in card readers

      solution1) talk about it and develop a fix
      solution2) send cease and decist letters to people who could possibly fix the issue, and rely on security through obscurity

      solution2 seems kinda silly to me..

      That's because you're assuming that the goal of the company is to provide a secure system.
      The goal of the company is to sell their system.
      Even if they fix the security holes, sales are affected by people talking about them.

      As long companies do bett

  • well (Score:5, Insightful)

    by Meeble ( 633260 ) on Monday April 14, 2003 @02:20PM (#5730124) Journal
    Pretty soon if will even be illegal to have this article posted since it relates to a story which relates to a specific technology that relates to reverse engineering of a product which relates etc etc - because some people don't know enough tech to be passing laws on it.

    If a default remote control, garage door opener, et al provided the features the consumers :really: wanted there would be no need for me to go buy a universal remote. It's not the consumer's fault the original creator's product doesn't meet people's needs

    I don't know if anyone else saw the >article [securityfocus.com] [securityfocus.com] about the student doing steganography work for his PhD - he's moving all his work offshore because he resides in Michigan and the super-dmca may make 'his whole academic career illegal' - depressing.
    • Re:well (Score:5, Interesting)

      by PCM2 ( 4486 ) on Monday April 14, 2003 @02:52PM (#5730432) Homepage
      Pretty soon if will even be illegal to have this article posted since it relates to a story which relates to a specific technology that relates to reverse engineering of a product which relates etc etc - because some people don't know enough tech to be passing laws on it.
      Well, once again, this is a case where somebody got hit with a cease and desist. No government action, repeat, no government action was involved with this story whatsoever. A lawyer wrote a letter to a guy, the guy got scared, and chose to curb his own behavior rather than potentially fight the issue in court. (Only potentially, mind you, because the lawyers/company might not have even chosen to pursue the issue, or to involve the DMCA in their case.)

      Yes, the possibility with getting slapped with a huge lawsuit and/or criminal charges is pretty scary. Somewhat scarier, on the other hand, is a society where people comply with the demands of other people even though those other people aren't really authorities at all.

      Police states are pretty bad. Worse, IMHO, is a people governed by the Will of f*cking Landru...

  • by DSL-Admin ( 597132 ) on Monday April 14, 2003 @02:21PM (#5730134)
    Way to secure the flaw, lets just not talk about the flaws and arrest anyone who says otherwise.

    The sky is Blue!!

    DMCA Official " You must cease to call the sky blue, as it is in violation of what we have said before that the sky is infact not there"
  • by Cutriss ( 262920 ) on Monday April 14, 2003 @02:22PM (#5730143) Homepage
    So, assuming that's not possible -- is the DMCA a viable tool to ensure security?

    Of course not...the DMCA is a tool that allows companies to safely keep their heads in the sand. Here on Planet Earth, wrapping a towel around your head doesn't *really* make the Ravenous Bug-blatter Beast of Traal go away.
  • by Probius ( 130206 ) on Monday April 14, 2003 @02:24PM (#5730152) Homepage
    Our school uses blackboard, and last year the machines were shut down for a long time because students used methods to get free stuff out of the snack machines. And I'm not talking cracking a case or making a fake card either. It was really simple too, like swiping really fast after the transaction, if I remember right, and you could get a second item for free. Kinda scary.
  • obviously not (Score:5, Informative)

    by ih8apple ( 607271 ) on Monday April 14, 2003 @02:24PM (#5730160)
    To answer the question "is the DMCA a viable tool to ensure security?"

    Here's [bbc.co.uk] an article from the BBC [bbc.co.uk].

    and here's a good presentation [treachery.net] from toorcon.

    and lastly, this [itworld.com] is a good article from ITWorld.
  • Money (Score:3, Insightful)

    by nehumanuscrede ( 624750 ) on Monday April 14, 2003 @02:25PM (#5730172)
    Cease and decist letters get written when someone threatens anothers money making schemes. To fix the problem costs money, to scare individual X into keeping their info to themselves is much cheaper.
  • by Anonymous Coward on Monday April 14, 2003 @02:27PM (#5730183)
    Say that a random person on the street finds a crack in a banks wall that allows intruders to get in, tack the cash, and run away. Should the person start holding seminars about how there's such a vulnerability, or should the person go tell the bank so it can fix it?

    Initially, the later case seems like the thing to do. But what if the bank ignores you? Should someone be allowed to convey information about a problem with a system if the system controllers refuse to fix it? I'd still think not - it'd be one thing to state that there is a vulnerability, and that in good conscience could not state what the vulnerability is, and quite another thing to go explaining the vulnerability to everyone else.

    Just my 2 cents, and as always, there's probably more to the story.

    F-bacher
    • by Frobnicator ( 565869 ) on Monday April 14, 2003 @02:39PM (#5730307) Journal
      or should the person go tell the bank so it can fix it?
      They DID try to tell the company, and were "blown off".
      But what if the bank ignores you? Should someone be allowed to convey information about a problem with a system if the system controllers refuse to fix it? I'd still think not - it'd be one thing to state that there is a vulnerability, and that in good conscience could not state what the vulnerability is, and quite another thing to go explaining the vulnerability to everyone else.
      This is something compuer security has had to deal with for quite some time. The normal ethical guidelines are to first contact the vendor and attempt to work with them to find a solution, and release the information once the vulnerability is corrected. If they either ignore it or fail to correct the problem in a reasonable time frame, the consensus is to take the problem to the security experts and users of the security system generally. This is based on the theory that criminals may already have such knowledge, and therefore the users need to know in order to protect themselves.

      Hope that helps with your question.

    • by tulare ( 244053 ) on Monday April 14, 2003 @02:43PM (#5730346) Journal
      I actually had something like this happen once. I went to a drive-up ATM at a bank I once used, and the machine was literally unlocked - there was a sort of swing-door arrangement where the whole ATM would open on a hinge sort of like some switch stacks do, and it was broken open. I decided not to stick my card in the machine and instead drove away to a payphone and called the bank.

      Amazingly, the people on the other end gave me attitude when I called to tell them that their ATM was broken open - the attitude switched between "it's not my problem" and "you must have done it." At no time did I believe that they were actually going to do anything about it.

      Two months later, when I was back in that town, I went to the same ATM, and the lock was still jimmied - it was closed, but obviously broken so that it would be a matter of prying with a screwdriver to open it again. I guess a couple of thousand bucks in cash and whatever private details can be gleaned from endorsed checks and deposit slips are unimportant to bancs of, um America.
  • Is this SLAPP? (Score:3, Interesting)

    by dacarr ( 562277 ) on Monday April 14, 2003 @02:29PM (#5730199) Homepage Journal
    Considering the nature of the security flaws and that they are now exposed, can this legal action against Virgil be challenged under SLAPP clauses?
  • by Blue23 ( 197186 ) on Monday April 14, 2003 @02:30PM (#5730214) Homepage
    You know a C&D letter may stop people from disclosing exploits, but will not stop people from disclosing that their are exploits. That's enough for lots of poor, enterprising college students.

    A much better plan would of been to let these guys give their talk, to hire them, fix the problems, and them make a bundle in upgrades to existing customers. Come on, if some of these installations are 20 years old we're not talking much more then maintenance revenue. On the other hand system upgrades, especially when demanded by parents, can net a pretty penny. The colleges could have fund drives, hit up alumni societies, all the normal ways to get money when something unexpected walks through the door.

    Instead the company gets to look like a fool that knows there are security flaws, aren't fixing them and instead are wasting money on laywers, get getting bad press.

    Oh well, I guess there is no such thing as bad press. And that companies would rather think about prestige short term then a better product long term, even if the better product will get them more money.

    =Blue(23)

  • Comment removed (Score:5, Interesting)

    by account_deleted ( 4530225 ) on Monday April 14, 2003 @02:31PM (#5730221)
    Comment removed based on user account deletion
    • Re:it's over (Score:3, Interesting)

      by HisMother ( 413313 )
      I can think of dozens of ways to get thrown in prison just by playing around with my system at night after work.

      The same could be said of cameras, chef's knives, wood chippers, and table saws. Does this mean that photographers should live in fear of accidentally creating child pornography, or chefs of accidentally dismembering their lovers? Nope. C'mon, buddy, you've got free will, you may recall. If you're not interested in fighting the laws, then just keep your nose clean. It's not rocket science, and i

    • by dubl-u ( 51156 )
      Time to stop being a geek. I'm getting my pencils and paper back out, doing RPGs that way,

      Uh, I hate to tell you, but if you're tring to stop being a geek you're on the wrong track. :-)

      I'd rather be an insurance guy or something similarly boring then spending part of my life in a 4x6 cell,

      Man, you must not have spent much time at an insurance company. 40 years at an insurance company is roughly the same number of hours you'd spend in a 10-year prison sentence, and the cells are about the same size. A
  • by sabinm ( 447146 ) on Monday April 14, 2003 @02:31PM (#5730230) Homepage Journal
    Surely Acidus and his colleagues informed the Universities about this before they went public with this information. That is of course the most effective way to get the system to change. . . Imagine inviting the Dean of Purchasing and Procurement to a Coke and a Apple pie on campus and using a facsimile of his id and account to pay for it. Or even more fun - - getting a sweet new laptop at the bookstore with a hyper-inflated account balance. Most certainly then Blackboard would think about upgrading their machines. Announcing that you are going to circumvent their digitally encrypted system in public, no less, simply gave Blackboard a way to facilitate their illegitimate hardware and polices and making it legitimate under the cover of an unjust law.

    As my good old Uncle Scrooge always said: Work Smarrrrrterrrr not harrrrrderrrrr
    • What's silly is that Blackboard is, in no way, in the clear. They know this. The circumvention WILL get out, and it WILL spread, and Blackboard KNOWS this.
      What they are doing is slowing the process down so they can create a fix, and implement it before everything goes nuts on tons of college campuses
    • by SysKoll ( 48967 ) on Monday April 14, 2003 @05:33PM (#5731762)
      Actually, someone tried that already. He ended up in jail.

      In 1997, after four years of research, a French cryptographer, Serge Humpich, found a flaw in the widely used French smart card, which requires owners to type a PIN on a payment terminal for all credit card and ATM transactions. He found that 1.the PIN was verified by the chip on the card, 2. some terminals didn't really check what chip they were talking to, and 3. If the chip told the terminal "yes, the PIN is right", the terminal would blindly accept the confirmation and allow the transaction. Such a card is called a "yes-card"

      Humpich contacted the Carte Bleue consortium, an association of 200 banks managing the French smart cards, and told them about the flaw. They refused to believe him. So he made a yes-card out of spare parts and went to a Parisian metro station. There, he bought a few metro tickets and send them, along with the payment receipt, to the Carte Bleue people. They immediately contacted the police.

      Humpich was arrested in September 1999 and jailed for several months. In 2000, he was given a suspended 10-month jail sentence and a $2600 fine. All his equipment and documentation was confiscated. Now he has a criminal indictment that bars him from a number of jobs.

      Of course, the French and US laws are different. But if anything, I suspect a US court will actually be harsher, especially now that the DMCA has been used in several precedents. Heck, the DMCA makes it almost mandatory to jail you if you figure out a way to program your VCR without reading the obviously encrypted documentation!

      So I really don't think it's a good idea to show the problem exists. Blackboard knows, the people who selected them as a supplier know, and if you show them that they're effectively slobs, they'll crush you to cover their asses.

      -- SysKoll
  • Stupid. Typical. (Score:5, Insightful)

    by jasenj1 ( 575309 ) on Monday April 14, 2003 @02:32PM (#5730236)
    If guns are outlawed, only outlaws will have guns.

    If hacking is outlawed (and talking about it), only outlaws will know how to hack.

    So who do you get to sue if someone makes a dupe of your ID card and raids your campus debit account, or breaks into your dorm room? The school? The hacker? The company that sold the school the lame ID system they claim is secure but is not?

    I would think the schools would like to know why sodas, meals, etc. are disappearing from their supplies. Hmmm.... This Coke machine is empty, but only 5 Cokes were recorded to be bought from it. Hmmm...

    This is the worst kind of security through obscurity.

    - Jasen.
  • by JimBobJoe ( 2758 ) on Monday April 14, 2003 @02:44PM (#5730353)
    After I left the Ohio State dorms in 1998 (I'm still a student) the university started to put card readers on the dorm entrances (up to that time either you had a key that opened both your dorm room and the main entrance, or you had two separate keys if you lived in a really big dorm.)

    It does offer some advantages, for instance, all people could be allowed into the dorms at some parts of the day, but other times of the day only people who live in that dorm could gain entry.

    Though there are some interesting caveats

    *the first one, which I didn't really know well at the time, is the fact that making a copy of the card is far easier than making a copy of the key. Remagnetizing magnetic stripes is not the hardest thing in the world.

    *the campuswide system runs off of ethernet to the AT&T9000 computer which administers everything. If a particular door gets disconnected with the central computer, it's default setting is to pretend like everything is normal, and let everyone in, and it has a cache of swipes which it would then transmit back to the central computer when the connection was restored. That seems like a sensible kludge given the circumstances, given a network failure it would be more sensible to allow all in as opposed to all out, especially at a dorm. (Higher security places would have their door failure mode set to allow no one.) On the other hand, as a security concept, it just bugged me. (this is explained in the powerpoint presentations.)

    *my big concern at the time was the tracking and auditing abilities, and it still is. the key system had no tracking and auditing. The swipe system allowed the university to keep a record of when students come into the building (and implicitly, when they go.) I pointed out that Ohio law prohibited a government institution from collecting information which were not authorized by law, nor required to achieve a particular purpose...and that the system need not perform the tracking, it only needed to perform the authorization.

    The response I got was that the system was not designed with a zero tracking/auditing setting, it needed to perform tracking and auditing as part of its authentication mechanism. I pointed out that I can't help that the university bought a dumbass product, and I threatened to sue them, but I was young, and I threatened to sue everyone. :-)

    I got a letter from the university lawyers saying "While we ourselves certainly hope never to need the archived data -- and, fortunately, rarely do -- it can be of unquestionable value in
    investigating incidents in the residence halls. It is for this very reason that similar systems are in use at numerous colleges and universities
    around the country."

    I've however pointed out that any idiot who was gonna do something in the dorms would do what everyone else does, and that is follow someone who swiped before you, and not swipe themselves.

    I still hope to work on this issue at some point. :-)
  • I have a OneCard (Score:5, Informative)

    by Feztaa ( 633745 ) on Monday April 14, 2003 @02:45PM (#5730363) Homepage
    I'm a student at the University of Alberta [ualberta.ca], and I have one of these OneCards.

    There are various machines around that let you deposit money onto your OneCard, but there is no "university-approved network" of stores that accept the OneCard as payment.

    The OneCard is primarily used for borrowing books from the library, and for operating the photocopiers/printers on campus, and there is exactly one vending machine on campus that allows you to pay with your OneCard.

    As for people living in residence who have meal plans (like me), there's a separate card for that, provided by Aramark [aramark.com]. To get into our dorms, we have keys. Laundry is coin-operated. The OneCard has absolutely nothing to do with the on-campus residences.

    For most finals and midterms, we're required to show our onecards and/or driver's licenses as photo ID, but the OneCards aren't swiped through a card reader or anything, it's just photo ID, nothing more.

    There are restricted areas on campus that you can access by swiping your OneCard and punching in a secret code, but as a first year undergrad, I don't have access to any of those places so I can't say what it's like (though for most of the places that aren't top-secret nuclear research facilities, it's almost trivially easy to get in by walking in when somebody else walks out -- we're friendly here in Canada, generally we hold the door open for people we don't know).

    So, if you're a student at a school that uses Blackboard, do you feel more secure now that the DMCA has tried to stop you from learning about its security flaws?

    Gee, I dunno. This is Canada, there is no DMCA here (as far as I know, anyway). Hopefully some Canadian security researcher will hear about this, and continue the research here...
  • by Scot Seese ( 137975 ) on Monday April 14, 2003 @02:45PM (#5730367)
    So.

    Instead of fixing the exploit in their keycard system, the company in question finds it easier to have their lawyers drop a house on the students.

    Doesn't "Security through Obscurity" create an environment where persons with malicious intent are free to exercise it?

    The students discovering the security hole = The Good Guys. The knowledge they posses equal a Munition (or, a firearm.) They were not planning to use their knowledge maliciously.

    Essentially the DMCA has turned knowledge into a weapon to be regulated through the legal system. Just be careful what you know, because speaking of it publicly is becoming the 21st century equivalent of pulling a gun out of your pocket at the mall to discuss it's function with another gun enthusiast.

    Of course, we all know the gun paradox. Seriously. Increasingly orwellian gun laws !=less crime. Criminals will always find weapons. On the electronic mean streats, crackers & hackers will always find exploits, but unlike the Good Guys, the Bad Guys won't go to a symposium to divulge the PROBLEM, embarassing the company into FIXING IT. Instead, the Bad Guys will EXPLOIT the FUCK OUT OF IT.

    I'm not a philosopher, psychologist, ethicist or sociologist by profession, but perhaps the DMCA needs to be re-evaluated by a panel consisting of a few. Right now it seems to favor only the government and very, very large corporations. Oh, and it makes learning a criminal act.

    Do you have a permit for your mind?

  • False advertising? (Score:3, Insightful)

    by BlueFall ( 141123 ) on Monday April 14, 2003 @02:54PM (#5730457)
    IANAL, but could someone sue the company for false advertising? If they say their product is safe and secure, but you feel it isn't and you are a user, then shouldn't your be able to bring a case against them? At that point, you have to present evidence for your claim and (assuming the court records aren't sealed) the exploit becomes public record.

  • by Animats ( 122034 ) on Monday April 14, 2003 @02:55PM (#5730471) Homepage
    The Economic Espionage Act of 1996 [cybercrime.gov] is worth reading. It's overly broad, and its definition of trade secrets is broader than that of the Uniform Trade Secrets Act.

    Trade secrets used to be frowned upon by the law. Patents were legally preferable, so that when the patent expired, the knowledge went into the public domain. A trade secret could be lost easily; any publication by anybody erased trade secret status. All trade secret law really did was to put some teeth into confidentiality requirements for employees. It didn't affect outsiders.

    All that has changed in the last decade. Between the Economic Espionage Act, the DMCA, and several court rulings, trade secrets now look more like property rights.

  • So, assuming that's not possible -- is the DMCA a viable tool to ensure security?

    The DMCA isn't about secruity--it's about copyright. Read the DMCA [copyright.gov], also known as Chapter 12 of Title 17, USC, and decide for yourself.

    IMO, the law should either be moved to a general security law, or it shouldn't be interpreted to cover anything except the aiding and abeiting of real anti-copyright infringment sale aid--that is, unless a device is intended to protect a document that's transmitted / broadcast, the DMCA shouldn't touch it.

    Then again, these are new positions for me--reply and you might change me again.
  • DMCA how? (Score:5, Interesting)

    by Sloppy ( 14984 ) on Monday April 14, 2003 @02:57PM (#5730483) Homepage Journal
    Anyone know what the copyrighted content that is protected by this technological measure, could possibly be?

    If it's something within the school, then the makers of the system wouldn't really have a DMCA complaint against researchers; the school (user of the blackboard product) would. (Just as MPAA, not DVDCCA, are the ones who had DMCA complaints when knowledge of bypassing CSS got out. It's the copyright holder of content who gets to use DMCA, not the inventor of a protection mechanism.)

    Assuming the blackboard lawyers actually see a way to use DMCA and aren't just trying to intimidate (hell of an assumption), then the copyrighed content must be some artistic expression within the Blackboard system itself, rather than something the system is intended to protect.

    If the copyrighted expression turns out to just be the serial number on a card, or something like that, then that would be very (*cough*) interesting.

  • by scrotch ( 605605 ) on Monday April 14, 2003 @03:01PM (#5730517)
    The only sane thing to do is to patent your exploits before you announce them. :)

    Then you have precedence for publishing them, or you just point to the online patent info.

    As a bonus, you can sue the companies that fix the holes you're supporting because they've broken that "shall circumvent a technological measure that effectively controls access to a work" line. After all, your exploit controls access, right? Opening a door is controlling access as much as locking it is.

  • by mykepredko ( 40154 ) on Monday April 14, 2003 @03:03PM (#5730536) Homepage
    Reading through the C&D letter, I have to wonder who approved it from Blackboard's perspective and if anybody technical thought through what may be the result of it is.

    There sounds like there is enough information in the letter so that somebody that knows what a 75176 is (I would disagree with the assertions in the paper about RS-485's obscurity), can program a PIC or an 8051 and can use an oscilloscope can reproduce the work done by Messrs. Griffith and Hoffman. Along with this it sounds like the readers are connected to standard cabling via standard connectors.

    So, the result I would expect from this letter is, 1) it will be put on the Internet for all to read, 2) boxes throughout the different colleges and universities that use the system will be pulled out of walls and vending machines with many of them stolen or vandalized to see what's actually inside them, next 3) The protocol and hardware will be distributed on a variety of web sites (probably ending with .ru or .iq) and finally 4) Blackboard's reps get innundated with phone calls, emails and letters complaining that their system is not secure.

    This begs the question on what Blackboard should have done. (next reply).

    myke
  • by foxtrot ( 14140 ) on Monday April 14, 2003 @03:05PM (#5730544)
    This past week, one of the first comments to be modded up as funny is someone claiming to be the Iraqi information minister.

    Now, they could have said something like, "There are no holes in the BuzzCard system, and we have repelled the elitist satan dogs who have attempted to break its security!" and it would have finally been funny!

    -JDF
  • free printing (Score:5, Interesting)

    by strider3700 ( 109874 ) on Monday April 14, 2003 @03:32PM (#5730780)
    We had the Onecard system at my school. Best hack we found was with the printing system. Insert a card with $30 on it in the machine toy print for $0.10 say this is my print job, wait for it to read amount on card. take out the card and put in a card with $0 on it. hit yes to print. $29.90 will be wrote to the card. Everyone I knew had $100 on the card in no time once we "borrowed" a profs card. We also got to print at half price by taking a copy of his card.

    People also spent time sniffing the one card network, but as far as I know no one had found anything interesting yet. this was 4 years ago, so I'd assume the entire thing is solved by now.
  • by jdunlevy ( 187745 ) on Monday April 14, 2003 @03:35PM (#5730813) Homepage
    Reminds me of an episode in "Surely You're Joking, Mr. Feynman!": Adventures of a Curious Character. Richard Feynman pointed out problems with security of file cabinets containing secret documents at Los Alamos. The "solution" to the problem? Easy! Keep Feynman away from the cabinets!
  • by xeno ( 2667 ) on Monday April 14, 2003 @03:44PM (#5730877)
    As a US citizen, I'm depressed (I should be outraged) at this sad state of affairs. However in-your-face this particular presentation was to be, the stated goal was to expose the flaws of the system through hand-on research & controlled experimentation. Research. It was NOT to distribute hacking tools for actual implementation to facilitate illegal or illicit purposes. But ballsy kids in an academic environment who want to improve the technology and processes that surround them? They're stymied by corporate protecionism ensconsed in federal law. That's sad. It's wrong, immoral, and ultimately ineffectual. But the real tragedy is that it depresses the level of creativity in academia and creates fear for those that think too hard.

    As a security professional, the fact that any cheeseball company can successfully hide their shoddy product behind a federal law is an embarassment. It induces even more cognitive dissonance when I work with federal and state goverment security staff who are well aware of good security principles, and then think about laws such as the DMCA which are diametrically opposed to known-good principles of improving security technology and processes.

    It's a lose-lose proposition: News of an exploit always gets out, and is propogated fastest within the community which has little fear of the DMCA. But invocation of the DMCA causes relatively-innocent people -- those that were willing to stand up and state their names -- to tremble and retreat. As I said: it's wrong, immoral, and ultimately ineffectual. I spend my days educating people about the dangers of security by obscurity, and exposing the risks associated with snake-oil solutions such as Blackboard's "secure" transactions. I'm doing my part to educate as many people as I can, but with Grand Moff Ashcroft at the legal helm of the country (and with US federal/foreign policy changed to match the prosecutorial principles of "pre-crime"), I'm afraid it's like spitting into the Mojave.

    The first time that some predator clones the card of a victim (or a patsy) in order to gain access to a building and rape/murder someone, I wonder... Will the appropriate law enforcement be able to effectively investigate/prosecute such a crime if the computing research community is prohibited from supporting them? Would Blackboard be content to sit on known security flaws and let a patsy get convicted? Again: wrong, immoral, and ultimately ineffectual. It ought to be illegal to *withhold* security flaws, at least from those who depend on/are subject to them. Feh.

    J
    • by MisterMook ( 634297 ) on Monday April 14, 2003 @04:24PM (#5731259) Homepage
      The first time someone uses the exploit to commit a rape or murder, the kneejerk reaction of the corportation will be to point at the students who knew the exploit and told officials about it as the scapegoats.

      "They told us that we didn't leave our door locked, since naturally it was intrusive to check our door to see if it was locked (even though it affected the security of the people telling us) we told the students to scram and forbid them to tell anyone that our doors were open. Unfortunately yesterday we had a sad epsiode on campus where someone entered through our unlocked doors and commited a heinous crime, sadly the conclusion to be derived from this is definite - those infiltrators that went checking our doors must have relayed the information to their despicable accomplices. The University declines any assumption of guilt or failure of any kind. Thank you."

      Face it, people suck and they don't ever stop sucking. The world is run by imbeciles to protect imbeciles, and the intelligent are their favorite food group unless they are creating more ways to create morons or joining the pack in their cannabilistic orgy of idiocy.
  • Restraining Order (Score:4, Informative)

    by bellings ( 137948 ) on Monday April 14, 2003 @03:47PM (#5730909)
    I must be missing something. Has a lawyer sent them a cease and desist letter? Or has a restraining order been granted against them by a court?

    Because, all the links point to a cease and desist letter, which are as cheap as lawsuits in the United States. Any schmoe can send a cease and desist letter. Hell, I could send CmdrTaco a letter claming that the space aliens he keeps in his laundry hamper are interfering with the workings of my tin-foil reflector beanie. You certainly don't have to do what the cease and desist letter tells you to do, any more than I have to follow instructions from the little voices in my head. Sometimes the little voices in my head give me good practical advice, like "change your socks." But you would be a fool to follow the advice of either the voices in my head or a random lawyer's cease and desist letter without question.

    But, I understand a restraining order as an entirely different thing. A restraining is handed out by a court, and unless you're fond of the inside of jail cells you would be well advised to follow it to the letter.

    So, did these people actually get a restraining order against them? Or is this just another badly misleading slashdot article?
  • 2600 Magazine (Score:4, Interesting)

    by MarvinMouse ( 323641 ) on Monday April 14, 2003 @03:58PM (#5731012) Homepage Journal
    There was an article in 2600 about 4 issues ago that had complete details on this system I believe, and how to hack into it.

    If I can remember which issue it was I'll post it here. If anyone else remembers, feel free to remind me. I remember though it basically showed how with no effort the system can be cracked.

    ** To avoid DMCA lawsuits, etc. I did not write this article or am involved with it's creation whatsoever. **
  • by cookie_cutter ( 533841 ) on Monday April 14, 2003 @04:46PM (#5731412)
    Maybe readers who go to schools that use such a system can expand on how that system is used.

    At my school, the recently mentioned [slashdot.org] McMaster University [mcmaster.ca], our residence meal plan could be used at local restaurants which had a deal with the Univerisity, like East Side Marios, Pizza Hut, and equivalent places.

    Thing was, while they were mainly restaurants, some of these restaurants had bars in them, and we found early on that the system did not discriminate between what one ordered from these places.

    So basically, one could use mommy and daddy's meal plan money. I think they eliminated this loophole since my first year, but it was good(by which I mean very very bad) while it lasted :)

  • by oblom ( 105 ) on Monday April 14, 2003 @06:37PM (#5732201) Homepage
    "A commercial, and in some respects a social, doubt has been started within the
    last year or two, whether or not it is right to discuss so openly the security
    or insecurity of locks. Many well-meaning persons suppose that the discus-
    sion respecting the means for baffling the supposed safety of locks offers a
    premium for dishonesty, by showing others how to be dishonest. This is a fal-
    lacy. Rogues are very keen in their profession, and already know much more
    than we can teach them respecting their several kinds of roguery. Rogues knew
    a good deal about lockpicking long before locksmiths discussed it among them-
    selves, as they have lately done. If a lock -- let it have been made in what-
    ever country, or by whatever maker -- is not so inviolable as it has hitherto
    been deemed to be, surely it is in the interest of *honest* persons to know
    this fact, because the *dishonest* are tolerably certain to be the first to
    apply the knowledge practically; and the spread of knowledge is necessary to
    give fair play to those who might suffer by ignorance. It cannot be too ear-
    nestly urged, that an acquaintance with real facts will, in the end, be better
    for all parties."

    -- Charles Tomlinson's Rudimentary Treatise on the Construction of Locks,
    published around 1850

"The vast majority of successful major crimes against property are perpetrated by individuals abusing positions of trust." -- Lawrence Dalzell

Working...