New Hampshire Underground

New Hampshire Underground => Civil Disobedience => Topic started by: error on May 31, 2008, 11:13 AM NHFT

Title: Little Brother
Post by: error on May 31, 2008, 11:13 AM NHFT
Big Brother is watching you. Who's watching back?

Stop whatever you're doing and read this book (http://craphound.com/littlebrother/) NOW. A free download (http://craphound.com/littlebrother/download/) is available.
Title: Re: Little Brother
Post by: Pat McCotter on May 31, 2008, 11:14 AM NHFT
Just finished it. A great read.
Title: Re: Little Brother
Post by: KJM on June 03, 2008, 07:45 PM NHFT
There are a plethora of worse ways to spend the next few hours of your life.  I hardly ever read fiction these days, but I was hooked before I even got to the first chapter.
Title: Re: Little Brother
Post by: TackleTheWorld on June 03, 2008, 07:50 PM NHFT
Not a bad read, but who believes the resolution?
Title: Re: Little Brother
Post by: K. Darien Freeheart on June 03, 2008, 08:04 PM NHFT
Quote from: 'TackleTheWorld'Not a bad read, but who believes the resolution?

Yeah, that upset me a bit. I'm not sure if I'm simply let down or if I should be upset that this was the only resolution his mind could fathom.  :-\
Title: Re: Little Brother
Post by: KBCraig on June 03, 2008, 09:41 PM NHFT
Quote from: TackleTheWorld on June 03, 2008, 07:50 PM NHFT
Not a bad read, but who believes the resolution?
Good read, very creative, but it diverged from the likely when the governor arrested the feds and kicked them out.

I love to hope for that resolution, but I find myself just too cynical. I mean, have you noticed who the presidential candidates are going to be?
Title: Re: Little Brother
Post by: Barterer on June 12, 2008, 09:50 AM NHFT
Well I had just begun reading the much thicker Cryptonomicon but will set it aside and read this first.  Mainly because the first few pages are full of giddy teenage shenanigans, I can't resist.  :icon_pirat:
Title: Re: Little Brother
Post by: ByronB on June 12, 2008, 01:00 PM NHFT
They are actually working on "Paranoid Linux" now...
Title: Re: Little Brother
Post by: K. Darien Freeheart on June 12, 2008, 01:05 PM NHFT
Quote from: 'ByronB'They are actually working on "Paranoid Linux" now

It could be a neat distro to provide tools to privacy minded people, but the "scatter" idea is kind of a waste of bandwidth. It's not too hard on the ISP side to reassemble a message, even one buried in crap. That said, installing things like the Pidgin OTR (Off the record) plugin by default, setting up encrypted volumes, using GPG by default, setting up Tor and using secure tunnels and such... Yeah, I'd download it. :P
Title: Re: Little Brother
Post by: Barterer on June 12, 2008, 01:24 PM NHFT
Quote from: ByronB on June 12, 2008, 01:00 PM NHFT
They are actually working on "Paranoid Linux" now...
In the meantime there's TORpark (http://www.download.com/Torpark/3000-2356_4-10586817.html), the tor/firefox combo you can carry around on a memory stick, and Anonym.OS (http://sourceforge.net/projects/anonym-os/), a BSD-based live CD.
Title: Re: Little Brother
Post by: TackleTheWorld on June 12, 2008, 01:58 PM NHFT
You know what I found really compelling and respectful about the book?  It explained technical stuff. 
So come on, master hackers, show some respect.  The rest of us just wrapped our heads around the private/public key encryption thing.
Title: Re: Little Brother
Post by: K. Darien Freeheart on June 12, 2008, 02:20 PM NHFT
Quote from: 'TackleTheWorld'So come on, master hackers, show some respect.  The rest of us just wrapped our heads around the private/public key encryption thing.

Sorry. :( I've been "in the scene" so long sometimes I am not even aware of what I take for granted.

Quote from: 'Kevin Dean'That said, installing things like the Pidgin OTR (Off the record) plugin by default

Pidgin (http://'http://www.pidgin.im/about/') is a neat program for instant messages, like MSN or AIM or ICQ. It lets you connect to any or all of those services from the same program and has some great features (like tabbed chats so you don't juggle windows). The off the record plugin encrypts the messages between you and the people you're chatting with so that someone "in the middle" can't figure out what's in the text you're sending.

Quote from: 'Kevin Dean'setting up encrypted volumes

Volume means "disk drive" in the most common sense. Encryption masks things as it's going across a network, encrypted volumes make it very difficult to figure out what it is when it's on either side of that network. Encrypting your chats, for instance, isn't that useful if you've got regular, readable copies of them on your disk drive.

Quote from: 'Kevin Dean'using GPG by default

The private/public encryption key thing mentioned in "Little Brother". He even called it 'pretty good privacy' in the book. PGP was a commercial version of this kind of thing but there was concern that the source code (Human readable instructions for a computer - with source code you can see what a program is actually "doing" when you use it) was kept secret by the company that made it. So a bunch of geeks got together and wrote a new version and made the source code freely obtainable so that anyone could find flaws or add improvements. This version is called GPG (GNU Privacy Guard).

Quote from: 'Kevin Dean'setting up Tor

Tor is kinda nifty. Normally, when you connect to the internet, there's a series of "hops" from your computer to the server you're "talking" to. When you hit submit after postng here, the data is sent from your computer to the router you got from the cable/phone company. From there it goes to your ISP, from them to "the backbone" to Russell and Kat's web host's ISP to the server that actually saves the forum.

Users of Tor, however, share their internet connection in chunks to anonymize traffic. Using Tor, clicking submit would send from your computer to the router to another Tor user's ISP to the Tor user's computer, to another Tor user's ISP to another Tor user and so on until at SOME point that Tor user's computer sends it's data to Russell and Kat's server, appearing to the server as if it originated from the last Tor user (who might be in India or Spain or anywhere). Data on the internet is broken into chunks and each chunk takes a different route so unless you managed to be watching all the possible end-points, no "man in the middle" could piece together every chunk and find out what you sent.

Quote from: 'Kevin Dean'and using secure tunnels and such

A tunnel is when you disguise one form of data as another. "Secure" tends to mean "encrypted". It's not a great way to hide something but it's more useful to utilize holes in a dragnet. The most common form of tunnel on the internet is disguising BitTorrent (person to person file sharing) traffic as regular browser traffic to get past ISP blocks of BitTorrent traffic. In China, where there is a government system that censors and blocks big chunks of the internet (called The Great Firewall of China) this kind of tunneling is useful.
Title: Re: Little Brother
Post by: Barterer on June 12, 2008, 03:12 PM NHFT
Quote from: TackleTheWorld on June 12, 2008, 01:58 PM NHFT
You know what I found really compelling and respectful about the book?  It explained technical stuff. 
I'm by no means a hacker, but the accuracy of some of the hacks in the book (at least what I've gotten to) add to the humor and charm of it.  Who knew about that $SYS$ method of hiding windows processes until Sony pulled that stunt with their music CDs, and it was all over slashdot.

It's kind of like that scene in The Matrix where one of the hacker-heroes used an actual UNIX/Linux command (+1 to whoever remembers it) and all the nerds went ohh-ahh-teeheehee-- just like my computer, I wish.
Title: Re: Little Brother
Post by: error on June 12, 2008, 03:21 PM NHFT
Quote from: Barterer on June 12, 2008, 03:12 PM NHFT
It's kind of like that scene in The Matrix where one of the hacker-heroes used an actual UNIX/Linux command (+1 to whoever remembers it) and all the nerds went ohh-ahh-teeheehee-- just like my computer, I wish.

ssh (http://en.wikipedia.org/wiki/Secure_Shell). I use it all the time to h4x0r into b0x3n. ;)
Title: Re: Little Brother
Post by: K. Darien Freeheart on June 12, 2008, 03:30 PM NHFT
I never saw SSH in the Matrix. :( Perhaps I need to hide my spoons (I'm not up for an arguement!) and rewatch.

Back to running cmatrix....
Title: Re: Little Brother
Post by: error on June 12, 2008, 03:39 PM NHFT
Oh yeah, nmap (http://www.insecure.org/nmap/) too.

(http://blogs.exist.com/xjhay/files/2007/12/reload_nmap_f.jpg)
Title: Re: Little Brother
Post by: Barterer on June 12, 2008, 03:52 PM NHFT
Yeah, nmap and sshnuke (?) 

I knew it was nerdier and more obscure than plain ol' ssh.  But you win! 
Title: Re: Little Brother
Post by: error on June 12, 2008, 04:46 PM NHFT
Quote from: Barterer on June 12, 2008, 03:52 PM NHFT
Yeah, nmap and sshnuke (?) 

I knew it was nerdier and more obscure than plain ol' ssh.  But you win! 

Yeah, but the thing is, the computer program "sshnuke" was entirely fictional (but the vulnerability it supposedly exploited was real).
Title: Re: Little Brother
Post by: Barterer on June 12, 2008, 05:04 PM NHFT
Darn, I'll have to get my system up to sci-fi standards  :D alias sshnuke="ssh"
Title: Re: Little Brother
Post by: TackleTheWorld on June 12, 2008, 09:09 PM NHFT
Quote from: Kevin Dean on June 12, 2008, 02:20 PM NHFT

Users of Tor, however, share their internet connection in chunks to anonymize traffic. Using Tor, clicking submit would send from your computer to the router to another Tor user's ISP to the Tor user's computer, to another Tor user's ISP to another Tor user and so on until at SOME point that Tor user's computer sends it's data to Russell and Kat's server, appearing to the server as if it originated from the last Tor user (who might be in India or Spain or anywhere). Data on the internet is broken into chunks and each chunk takes a different route so unless you managed to be watching all the possible end-points, no "man in the middle" could piece together every chunk and find out what you sent.

Thanks for the explanations, Kevin!
Wasn't an anonymizer like tor mentioned in the book?
Title: Re: Little Brother
Post by: Pat McCotter on December 22, 2008, 05:57 AM NHFT
Little Brother (http://craphound.com/littlebrother/download/) is one of January Magazine's Best of 2008 Children's Books (http://januarymagazine.com/2008/12/best-of-2008-childrens-books.html).
Title: Re: Little Brother
Post by: AntonLee on December 22, 2008, 07:57 AM NHFT
this looks interesting I'm going to have to read it now.
Title: Re: Little Brother
Post by: EthanLeeVita on December 22, 2008, 08:03 AM NHFT
I read it awhile ago and I enjoyed it. Ending wasn't perfect(nor seemed that realistic) for my anarchist beliefs, but it was definitely a fun read.