Fw: Attack of the Killer RIAA FUD App (Was Re: know people in .ut.us?)

Christopher Bardin plug-discuss@lists.plug.phoenix.az.us
Wed, 18 Jun 2003 22:47:42 -0700


This is a multi-part message in MIME format.

------=_NextPart_000_000B_01C335EB.A0B29270
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

If Hatch's senile fantasy of attack software is actually carried =
through, it will be a gift to the internet vandals who presently have to =
make do with homemade viruses and worms.  Imagine what they would do =
with professionally developed malware; it would be like handing an Uzi =
to a toddler.

Once the attack program(s) were released into the wild, as it were, to =
do their dirty work, it would only be natural for hackers (as opposed to =
crackers) to reverse engineer them out of professional curiosity.  And =
soon enough vandals would get hold of them and pandemonium would ensue =
on the internet.  Imagine the lawsuits that the RIAA and others who =
developed the software would have to defend themselves against then.  =
Talk about being hoist with one's own petard!

Obviously the best defense for existing computers is to invest in =
software which periodically makes full backups that can quickly restore =
your hard drive to a known good earlier state.  And, of course, to =
support the development and use of alternative desktop operating systems =
such as Linux, and other software such as the Mozilla browser, because =
the attack software would most likely be developed with Windows in mind. =
 The more diversity the attack software has to deal with, the less =
likely it would be to succeed in every case.  If the RIAA has anything =
to say about it, future computers will be designed with a self-destruct =
which could be activated by software.  Wouldn't that be fun.

On Wednesday, "Robert Bushman" commented that:

  "Perhaps we should also start extending the "justifiable"
  laws.  He jaywalked in front of my car, so I ran
  him over.  Justifiable assault - he was breaking the
  law and obstructing my lawful progress down the
  motorway."

It's already been done; in Phoenix last week some guy used his Hummer as =
a weapon to run down and destroy a car with 3 people in it whom he =
claimed had robbed him.  He probably won't be charged with anything even =
though he chased the car down, because the prosecutor knows he couldn't =
get a conviction.

-Christopher Bardin

------=_NextPart_000_000B_01C335EB.A0B29270
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2800.1170" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<P dir=3Dltr>If Hatch's senile fantasy of attack software is actually =
carried=20
through, it will be a gift to the internet vandals who presently have to =
make do=20
with homemade viruses and worms.&nbsp; Imagine what they would do with=20
professionally developed malware;&nbsp;it would be like handing an Uzi =
to a=20
toddler.</P>
<P dir=3Dltr>Once the attack program(s) were released into the wild, as =
it were,=20
to do their dirty work, it would only be natural for hackers (as opposed =
to=20
crackers) to reverse engineer them out of professional =
curiosity.&nbsp;&nbsp;And=20
soon enough vandals would&nbsp;get hold of them and&nbsp;pandemonium=20
would&nbsp;ensue on the internet.&nbsp; Imagine the lawsuits that the =
RIAA and=20
others who developed the software would have to defend themselves =
against=20
then.&nbsp; Talk about being hoist with one's own petard!</P>
<P dir=3Dltr>Obviously the best defense&nbsp;for existing computers is =
to invest=20
in software which periodically makes full backups that can =
quickly&nbsp;restore=20
your hard drive to a known good earlier state.&nbsp; And, of course, to =
support=20
the development and use of alternative desktop operating systems such as =

Linux,&nbsp;and other software such as the Mozilla browser, because the =
attack=20
software would most likely be developed&nbsp;with&nbsp;Windows in =
mind.&nbsp;=20
The more diversity the attack software has to deal with, the less likely =
it=20
would be to succeed in every case.&nbsp; If the RIAA has anything to say =
about=20
it, future computers will be designed with a self-destruct which could =
be=20
activated by software.&nbsp; Wouldn't that be fun.</P>
<P dir=3Dltr>On Wednesday, <FONT face=3DVerdana size=3D2><FONT=20
face=3D"Comic Sans MS">"Robert Bushman"</FONT> <FONT=20
face=3D"Comic Sans MS">comm</FONT></FONT>ented that:</P>
<BLOCKQUOTE dir=3Dltr style=3D"MARGIN-RIGHT: 0px">
  <P dir=3Dltr><FONT size=3D4>"Perhaps we should also start extending =
the=20
  "justifiable"<BR>laws.&nbsp; He jaywalked in front of my car, so I =
ran<BR>him=20
  over.&nbsp; Justifiable assault - he was breaking the<BR>law and =
obstructing=20
  my lawful progress down the<BR>motorway."</P></BLOCKQUOTE></FONT>
<P dir=3Dltr><FONT size=3D4>It's already been done; in Phoenix last week =
some guy=20
used his Hummer as a weapon to run down and destroy a car with 3 people =
in it=20
whom he claimed had robbed him.&nbsp; He probably won't be charged with =
anything=20
even though he chased the car down, because the prosecutor knows he =
couldn't get=20
a conviction.</FONT></P>
<P dir=3Dltr><FONT size=3D4>-Christopher Bardin</P></FONT></BODY></HTML>

------=_NextPart_000_000B_01C335EB.A0B29270--