Welcome, Guest. Please login or register.

Author Topic: viruses and hashes  (Read 1438 times)

Description:

0 Members and 1 Guest are viewing this topic.

Offline orangeTopic starter

  • Hero Member
  • *****
  • Join Date: Dec 2003
  • Posts: 2794
    • Show only replies by orange
viruses and hashes
« on: August 27, 2014, 06:44:56 AM »
sorry, perhaps a bit offtopic..
there is this excellent 'whitelist' project: http://www.nsrl.nist.gov/
seems it hasn't been mentioned here before. Its aim is to catalog hashes (md5 and sha, iirc) of all (executable) files! Yes, there are some Amiga files in the database. That should help a lot in tracking down viruses and such. There is also that site with Kickstart (and Workbench) hashes.
Anyway, I think, if nsrl site accepts submissions, people with lot of original software should help.
Better sorry than worry.
 

Offline Minuous

Re: viruses and hashes
« Reply #1 on: August 27, 2014, 05:56:36 PM »
You're joking, right? You want people to help the NSA in their mission to erode our freedoms?
 

Offline orangeTopic starter

  • Hero Member
  • *****
  • Join Date: Dec 2003
  • Posts: 2794
    • Show only replies by orange
Re: viruses and hashes
« Reply #2 on: August 28, 2014, 07:12:33 AM »
Quote from: Minuous;771859
You're joking, right? You want people to help the NSA in their mission to erode our freedoms?


I wouldn't be so paranoid. This is Amigas, after all. Doubt anyone uses them for anything interesting to NSA. Besides, anyone can check the hashes themselves and report errors.  

In any case, its a good idea. Maybe someone 'independent' could start making such database for Amiga, or simply expand the one with Workbench and Kickstart.
Better sorry than worry.
 

Offline whabang

  • Hero Member
  • *****
  • Join Date: Mar 2002
  • Posts: 7270
    • Show only replies by whabang
Re: viruses and hashes
« Reply #3 on: August 28, 2014, 10:18:20 AM »
Amiga is one of the few computers that can be used to repel mind control waves - DON'T LET THE NSA SPY ON YOUR AMIGA!!:rant:
Beating the dead horse since 2002.
 

Offline orangeTopic starter

  • Hero Member
  • *****
  • Join Date: Dec 2003
  • Posts: 2794
    • Show only replies by orange
Re: viruses and hashes
« Reply #4 on: August 28, 2014, 10:33:16 AM »
Quote from: whabang;771881
Amiga is one of the few computers that can be used to repel mind control waves - DON'T LET THE NSA SPY ON YOUR AMIGA!!:rant:


gotta love the tinfoiled penguin.
perhaps someone should start making one with boing logo, for the worried Amigists.
Better sorry than worry.
 

Offline Linde

  • Sr. Member
  • ****
  • Join Date: Mar 2004
  • Posts: 457
    • Show only replies by Linde
    • http://hata.zor.org/
Re: viruses and hashes
« Reply #5 on: August 28, 2014, 03:49:21 PM »
Quote from: Minuous;771859
You're joking, right? You want people to help the NSA in their mission to erode our freedoms?


NSA? How are they involved in this project and how will they erode our freedoms using checksums?
 

Offline orangeTopic starter

  • Hero Member
  • *****
  • Join Date: Dec 2003
  • Posts: 2794
    • Show only replies by orange
Re: viruses and hashes
« Reply #6 on: August 28, 2014, 04:40:04 PM »
Quote from: Linde;771903
NSA? How are they involved in this project and how will they erode our freedoms using checksums?


my guess is he thinks we might one day be forced to use 'whitelist' only software. something like that TPM thing. but that horse left the stable long ago. people want freedom.

or, perhaps, that a 'government approved' virus would be listed.
« Last Edit: August 28, 2014, 04:51:45 PM by orange »
Better sorry than worry.
 

Offline Minuous

Re: viruses and hashes
« Reply #7 on: August 28, 2014, 05:25:10 PM »
I shouldn't really need to explain this, it is written there on the site in black and white:

Quote from: Linde;771903
NSA? How are they involved in this project

"The RDS can be used by law enforcement, government, and industry organizations to review files on a computer by matching file profiles in the RDS."

Quote
and how will they erode our freedoms using checksums?

"This will help alleviate much of the effort involved in determining which files are important"

Clearly it is intended for mass remote surveillance, they're not even bothering to hide the fact. Once upon a time (pre-Snowden) that viewpoint might have been considered paranoid...but not anymore...
 

Offline Matt_H

Re: viruses and hashes
« Reply #8 on: August 29, 2014, 03:25:16 AM »
I highly doubt that human freedom is jeopardized by the NSA knowing the md5 of PageStream 2.2.
 

Offline Dandy

  • Hero Member
  • *****
  • Join Date: Apr 2004
  • Posts: 1221
    • Show only replies by Dandy
    • http://www.wiehltalbahn.de/en/
Re: viruses and hashes
« Reply #9 on: September 01, 2014, 10:53:00 AM »
Quote from: Matt_H;771951


I highly doubt that human freedom is jeopardized by the NSA
...



The whole planet is jeopardised by the mere existance of such an organisation...
 ;)
All the best,

Dandy

Website maintained by me

If someone enjoys marching to military music, then I already despise him. He got his brain accidently - the bone marrow in his back would have been sufficient for him! (Albert Einstein)
 

Offline Linde

  • Sr. Member
  • ****
  • Join Date: Mar 2004
  • Posts: 457
    • Show only replies by Linde
    • http://hata.zor.org/
Re: viruses and hashes
« Reply #10 on: September 01, 2014, 08:21:10 PM »
Quote from: Minuous;771910
I shouldn't really need to explain this, it is written there on the site in black and white:



"The RDS can be used by law enforcement, government, and industry organizations to review files on a computer by matching file profiles in the RDS."

Sorry, I'm still not sure how NSA is involved in this project. Much like any open information, yes, it can be used by industry organizations, law enforcement and government.

The information the list contains is not personal, it's not secret, and collecting it is a trivial job. The potential use of it to infringe upon personal rights is similar to that of a shoe -- a pretty useful tool for all sorts of things, but sure, you could figure out a way to hurt someone with it.

Quote from: Minuous;771910
"This will help alleviate much of the effort involved in determining which files are important"

Clearly it is intended for mass remote surveillance, they're not even bothering to hide the fact. Once upon a time (pre-Snowden) that viewpoint might have been considered paranoid...but not anymore...


You're making quite a leap there. This information is about as useful in mass surveillance as super soakers are in fighting wildfires. The NSA likely use more sophisticated file signatures than a bunch of rigid checksums in a list that is updated less than once a month. More importantly, they probably focus more on what is being communicated over networks than what legitimate software is installed on a person's computer. The part that you quoted but cut off before it contradicted your conclusion puts the likely use of this in law enforcement quite well: "This will help alleviate much of the effort involved in determining which files are important as evidence on computers or file systems that have been seized as part of criminal investigations." A seized computer is often scanned for documents, and identifying the software installed can greatly narrow the search for those without the budget for more sophisticated means.

The way software update cycles are nowadays, the worst I can see in this list is a waste of money and effort.
 

Offline Linde

  • Sr. Member
  • ****
  • Join Date: Mar 2004
  • Posts: 457
    • Show only replies by Linde
    • http://hata.zor.org/
Re: viruses and hashes
« Reply #11 on: September 01, 2014, 08:42:40 PM »
Quote from: orange;771908
my guess is he thinks we might one day be forced to use 'whitelist' only software. something like that TPM thing. but that horse left the stable long ago. people want freedom.

This is extremely unlikely. There exists loads of software and hardware that would make this impossible to enforce.

Quote from: orange;771908
or, perhaps, that a 'government approved' virus would be listed.

The people who work with identifying viruses know better than to base their assessments on information provided by a government agency. The government agency that could produce such a virus would know better than to design it in such a way that its hash would be consistent. Having viruses modify themselves while executing to avoid naive content based identification has been an established technique for a long time.