Archive for the ‘Privacy’ Category

(Photo credit: Wikipedia)

By now, everyone’s heard of “those hacker conventions”, DEFCON, Black Hat, and others.

Some folks have wildly wrong ideas about what goes on at hacker conventions, but in general, they are an opportunity for security researchers (hackers) to share what they have learned, with other security researchers (hackers).

The researchers (hackers)? They do it because they enjoy teasing apart how things work, understanding the implications, interactions and potential hazards they embody.

An example of this is the security exploit that was briefed at BlackHat this year by Cody Brocious.   After you’ve read the synopsis at the link above, here’s a good explanation of the exploit. Now, consider the following media reports:

This leads to the obvious questions:

  1. Were these break-ins attributable to the briefing at BlackHat?
  2. Were these break-ins attributable to other, independently discovered implementations of the same exploit?
  3. Were there break-ins using this exploit before the BlackHat briefing?
  4. Were earlier break-ins not recognized, before this exploit was exposed, and perhaps blamed on hotel staff?

So, what do you think?  Answer our poll question, and feel free to comment.

Related articles

Advertisements

Read Full Post »