Forgot your password?
typodupeerror
Security The Internet

Earthstation 5 Claimed to be Malware 548

Posted by michael
from the compiled dept.
Rob from RPI writes "You may remember the announcement about a company, or program, or both called Earthstation 5 who recently 'Declared War' on the MPAA. Well guess what? Turns out that it's got code in it that allows anyone to delete any file on your computer. I suggest that you un-install as soon as possible!"
This discussion has been archived. No new comments can be posted.

Earthstation 5 Claimed to be Malware

Comments Filter:
  • Geocites eh? (Score:5, Informative)

    by Anonymous Coward on Friday October 03, 2003 @10:31AM (#7123616)

    Because the link is on geocities it's sure to be /.'d in 23 milliseconds. Here is a mirror I put up with the bin and src. [grub.net]
    Don't trust code from sources you don't know. I only provide these for the inevitable geocities /.ing
  • by aacool (700143) <moc.liamg2abmalnamaa> on Friday October 03, 2003 @10:32AM (#7123632) Journal
    This isnt surprising - the slashdot rage/paranoia/humor when Earthstation 5 was announced was palpable.


    Just goes to show you can't trust anyone but the RIAA for f'air and balanced info-warfare:)

  • by Anonymous Coward
    Whats worse the RIAA/MPAA or people trying to get on our good sides then backstabbing us?
    • People trying to get on your good side, then backstabbing you. By far.

      It's much better to know your enemies. I wonder if we could call this network terrorism? Someone call ASScroft!
      • From their website... (quote) Our group is made up of many people, Jordanians, Palestinians, Indians, Americans, Russians and Israelis. Some of us are Jewish, some Christians, some Hindus and other of us are Muslim. Believe it or not, we all love and respect each other. (/quote) Yesh, now we know that was too good to be true.
      • Well, you know what Sun-Tsu said about knowing yourself and your enemies ( he who knows both is assured a victory ).

        In a computer's case, it's knowing as much about the program you're about to install as you can and monitoring your computer to see what's going on with it. That way, malware stands a smaller chance of screwing with your system.
  • by Ygorl (688307) on Friday October 03, 2003 @10:32AM (#7123636)
    Really, I mean it. From looking at their web site one would have thought they were totally legitimate!
  • Now they can delete all those movies from your hard disk!
    • Or maybe this is just a ploy by the RIAA/MPAA to get people to uninstall the software. I realize that code is provided and this is probably legit, but if they see that a "scare" of this type succeeds in getting people to stop using ES5, maybe they'll try something similar with Kazaa, but fake.
  • by BlackBolt (595616) on Friday October 03, 2003 @10:33AM (#7123641) Homepage Journal
    It deleted itself.
  • Well yeah.. (Score:5, Insightful)

    by Anonymous Coward on Friday October 03, 2003 @10:33AM (#7123647)
    A P2P service that ACTIVELY PROMOTES piracy? It sounded too good to be true, and it was. All of this wonderful information from some schmoe with an email @yahoo.com? This whole deal is shady, no matter how you look at it.
  • by Stalyx (633692) on Friday October 03, 2003 @10:34AM (#7123654)
    And in other news when Reuter's contacted Earth Station 5's lead programmer, he had apparently mumbled under his breath.. "its not a bug damnit!, it's a feature"
  • Tinfoil alarm! (Score:4, Insightful)

    by sebi (152185) on Friday October 03, 2003 @10:34AM (#7123656)
    Wouldn't that be just the cleverest act of terrorism you can think of? Bait the "foreign devils" with all you hate about them and then, BAM!, nuke millions of computers in an instant. Takes more preparation to get off the ground than your garden variety virus or worm but the pay-off is much greater, isn't it? And if I was living in Palestine threat of legal action by some American interest group would be the least of my worries.
    • 1. Release excellent mother-of-them-all P2P software under guise of legitimate software
      2. Once everyone has it, delete all pirated files
      3. Profit!

      I half wish they'd actually do that - maybe it would incite a full boycott. Though I am happy with the understanding that their sales are declining already.

    • Re:Tinfoil alarm! (Score:5, Insightful)

      by cybermace5 (446439) <g.ryan@macetech.com> on Friday October 03, 2003 @10:59AM (#7123933) Homepage Journal
      I realize that perhaps, to many of you, computers and the Internet is Life Itself. However, a massive computer mixup is NOT a disaster on the scale of WTC or some other event causing major casualties.

      I just get annoyed when I hear a computer attack referred to as an effective terrorist strategy. I certainly could survive if my computer didn't turn on today; no terror here, just kind of disappointment. Perhaps something like this could be called a "bummer. oh well" attack.
      • Re:Tinfoil alarm! (Score:3, Insightful)

        by skarmor (538124)
        realize that perhaps, to many of you, computers and the Internet is Life Itself. However, a massive computer mixup is NOT a disaster on the scale of WTC or some other event causing major casualties. I just get annoyed when I hear a computer attack referred to as an effective terrorist strategy. I certainly could survive if my computer didn't turn on today; no terror here, just kind of disappointment. Perhaps something like this could be called a "bummer. oh well" attack.

        Nobody really cares if you can
        • Re:Tinfoil alarm! (Score:2, Insightful)

          by cybermace5 (446439)
          Oh come on, nobody worries about that! Everyone here's just scared they won't be able to check email, post on Slashdot, run a game of Counterstrike. They would have to stumble out of doors, mixing with the rest of the population...uh...ok I see why this would be a terrorist attack now.
      • Bummer!! (Score:3, Interesting)

        Ack, what could happen worse than a disaster like the WTC towers crashes terrorism?!? (intentionally bad grammar.) Computers control the world today, after all, if we had better computers, the terrorist never would have been able to sneak weapons on the airlines in the first place.

        While I'm aware than ES5 doesn't concern government or big business, it could have devistating effects IF it did. Think instead of a business instant messenger. That would be just peachy, so you're running the missle control p
      • Because you just know that a well organized technologically sophisticated terrorist cell would target the average user's access to pr0n. Hit us where it hurts, right? Infidel western devils just gotta have that pr0n.

        Perhaps it hasn't occurred to you, but computers run: air traffic control, banking, train switching, power production and distribution, water treatment purification and distribution, and pretty much all communication technology at this point.

        Having your computer not turn on might be an "aw b

  • by Nick of NSTime (597712) on Friday October 03, 2003 @10:34AM (#7123660)
    If I had received this in my Inbox, I probably would have ignored it. It's interesting that I'm conditioned (brainwashed?) to ignore this stuff when it's in an email, but when I read it on /. I take it seriously.
  • by skryche (26871) on Friday October 03, 2003 @10:34AM (#7123662) Homepage
    What about the terrible GUI? That's the real crime here!
  • by fred ugly (125371) <fugilyfred@h[ ]ail.com ['otm' in gap]> on Friday October 03, 2003 @10:35AM (#7123672)
    to hear our comments. http://www.earthstation5.com/contact.html [earthstation5.com]
  • Methods known (Score:4, Interesting)

    by Doesn't_Comment_Code (692510) on Friday October 03, 2003 @10:36AM (#7123682)
    Well, even if these guys are backstabbers (which apparently they are) they've disclosed their methods. And that should allow for a somewhat speedy recoding of a similar program that doesn't include screw_up_my_file(char* filename).

    Seriously, it was good theory, but they didn't have anything earthshattering that couldn't be replicated.

    I'll be watching for anything more that is discovered about motives. This seems to be the most curious and intriguing part of the story.
  • Battlestations... (Score:4, Insightful)

    by finalnight (709885) on Friday October 03, 2003 @10:36AM (#7123685)
    This mofos were the ones behind the summer DoS attacks on all the big BT sites, and now this. Gentlemen, start your cracking...
  • by caferace (442) on Friday October 03, 2003 @10:36AM (#7123689) Homepage
    This came across the FD list yesterday afternoon. Typically, an announcement of this type would elicit a fair amount of discussion. Usually at leat *one* other person would have confirmed it, or at least rebutted the claim.

    As of this writing, I haven't seen a single follow-up post.

    Is it true? I don't know, Is it a hoax? I don't know that either. It has more than a few caveats about using the exploit, that's for sure.

    What I do know is that that Geocities site with the exploit code will disappear bandwidth constrained faster than snot. :)

    • I think you may be right; this whole thing does seem a little fishy here. I myself used earthstation5 for a couple of days but deleted it after I got feed up with the slow transfer speeds and terrible interface. I have serious doubts that there are 15 million people (where do they get their numbers? - this is supposed to be completely decentralized program, with no severs)) that are simultaneously willing to put up with all the BS associated with this particular pile of stinking crap. I have since moved ove
    • I downloaded es5us.exe from their download page just a few minutes ago and got a completely different build number. I tried the exploit code and all of the test cases failed. I'm not even sure where that beta URL came from. I've never used E5 before, so I can't test it on an older copy -- or even validate those versions exist.
  • by TopShelf (92521) * on Friday October 03, 2003 @10:37AM (#7123700) Homepage Journal
    Wait a minute, I thought these guys were anti-MPAA and anti-RIAA, meaning they can only be powerful forces for good!

    Arggggghhhhh

    Binary world-view is breaking down as we speak...
    • Who benefits from deleting the hard-drives of music swappers? I hate to go all conspiracy theory, but I really can't think of anyone other than the RIAA/MPAA who would find use in baiting mp3 traders with a new "safe" trading system, only to have it begin nuking their computers...
  • by vudufixit (581911) on Friday October 03, 2003 @10:37AM (#7123701)
    A bad UPN science fiction series.
  • by Badgerman (19207) on Friday October 03, 2003 @10:38AM (#7123714)
    Tinfoil hat on . . .

    Let's say ES5 is an MPAA/RIAA front to discredit file sharing and harm filesharers.

    Now, apparently, ES5 is in Palestine.

    What better way to do "double damage" than to not only have a way to attack filesharers, but also to connect it to a location people associate with terrorism?

    OK, tinfoil hat off now.

    • Yeah, I'd go for the same thing, but this seems a little bit beyond the RIAA/MPAA's usual demonstated technical level. The registrant data on the domains and the IP block data submitted by their upstream ISP (SpeedNet) tallies, and the IPs *are* in Israel. It might be bonafide in that I doubt very much that the RIAA/MPAA are going to have much legal sway in Palestine, but the thing just smacks of blatant scam to sucker in the terminally dense to me; *far* too good to be true.
  • by ruiner13 (527499) on Friday October 03, 2003 @10:38AM (#7123718) Homepage
    I'm sure everyone has at least seen one article where they tell you to NEVER install software from a company you've either never heard of, or don't trust. At this point, the internet has been around long enough that most people realize this, especially if you have data on your machine that is so important that you can't risk getting a virus or a trojan (such as this, apparently) on it. Live by the internet, die by the internet. Just because someone claims to be against the RIAA doesn't make them your friend. Just because someone is against SCO, doesn't make them about free software rights. There are such things as self-serving deeds, even if they appear to be good gestures to all.
  • by Anonymous Coward on Friday October 03, 2003 @10:39AM (#7123721)
    Rest assured, brothers, your files have not been deleted; they have been martyred and are currently being serviced by 72 virgins.
  • by Anonymous Coward on Friday October 03, 2003 @10:39AM (#7123725)
    Deep Space 9
    Babylon 5
    The Dagobah System
  • About a missing file: /home/dnotj/.wine/fake_windows/boot.ini
  • by Durzel (137902) on Friday October 03, 2003 @10:40AM (#7123744) Homepage
    I'm curious - how can it be determined without the benefit of source code for ES5 that the exploit isn't just a horrendous oversight instead of a malicious pre-meditated function of the software?

    If it is malicious it seems odd that they would make it possible for ANYONE to delete someone elses files through crafted search strings, thus significantly increasing the chance of their nefarious plans being uncovered.

    If it were me, and I was secretly working for the RIAA, I'd just code in a simple client/server protocol that the RIAA could use to delete people's files, entirely seperate from the normal operation of the program itself. This would be much harder to identify as malicious code.

    Sorry, but this just looks to me like a bad "failure to chroot()" bug and not the big conspiracy theory its purported to be...
    • Well, the conclusion simply says that they dont know what the use for some special "delete file" command could be and add the MPAA/RIAA story as a theory.

      I dont think that its simply something like a missing chroot() bug, i cant think of any good reason why you would have "delete file" command implemented in a P2P client... Fellow slashdotters, anyone got an idea why one would implement this?

      • by dtrent (448055)
        Having worked at a small software company, I'll speculate.

        This could have been added as an "internal" feature and forgotten about it. It could have been added by one un-professional programmer, unbeknownst to the rest of the group. It could be in there on purpose, and the team is naive enough to believe it'll never get abused. It could be in there on purpose because they want it there and they don't care about the ramifications. And finally, it could be there because they have plans to use it some day
    • by Viol8 (599362) on Friday October 03, 2003 @11:00AM (#7123949)
      "I'm curious - how can it be determined without the benefit of source code for ES5 that the exploit isn't just a horrendous oversight instead of a malicious pre-meditated function of the software?"

      Even in assembler its not too hard to see when an operation is a bug resulting from jumping to a bit
      of code when some unexpected events coincide and jumping to the same bit of code when a SPECIFIC packet arrives.
    • by krumms (613921)

      I'm curious - how can it be determined without the benefit of source code for ES5 that the exploit isn't just a horrendous oversight instead of a malicious pre-meditated function of the software?

      Well, I'm curious - what more proof do you want?

      The FD post made it clear that a particular function of the ES5 software ("0Ch, sub-function 07h") caused the behaviour. That's a completely separate function that seems to have the sole purpose of deleting files remotely. The likelyhood of such code ever getting

    • If it were me, and I was secretly working for the RIAA, I'd just code in a simple client/server protocol that the RIAA could use to delete people's files, entirely seperate from the normal operation of the program itself. This would be much harder to identify as malicious code.

      Yeah, that's a good idea you have there. Obviously these guys are amateurs. No security expert ever notices when a program opens a second connection completely unrelated to the operation of the program. If they had done that they wo
  • IT'S A TRAP! (Score:5, Interesting)

    by teamhasnoi (554944) * <.teamhasnoi. .at. .yahoo.com.> on Friday October 03, 2003 @10:44AM (#7123784) Homepage Journal
    It sounds interesting - any /.ers try the exploit out yet?

    The first place I heard about E5 was on Slashdot, in a sig - I thought about trying it out, but something didn't seem quite right.

    Too much flash and cash on the website, and sweeping claims that hadn't made it elsewhere turned me off.

    I'm thinking it's the same 'spidey sense' that goes off when I get an email with an evil attachment.

  • by Bingo Foo (179380) on Friday October 03, 2003 @10:44AM (#7123791)
    $ grep "rm" ~/W4R3Z/es5
    Binary file ~/W4R3Z/es5 matches
    $
  • To think someone downloaded software from a company in Palestine..... Hmmm... Has anyone told bush and ashcroft about this? This could be a terrorist plot!
  • by mblase (200735) on Friday October 03, 2003 @10:46AM (#7123813)
    Did you know that you can rearrange the letters of "EARTHSTATION FIVE" to spell "RIAA VOTES IN THEFT"?

    They're behind the whole thing, I'm telling you.
  • by ghost1 (713051) on Friday October 03, 2003 @10:47AM (#7123830)
    Link to Zeropaid discussion with the actual code http://www.zeropaid.com/news/articles/auto/1002200 3i.php
  • Whois (Score:2, Funny)

    by Xerxes2695 (706503)
    www.es5.com is regestered to (get this)

    Earthstationv Ltd., A Palestinian Corporation
    Jenin refugee camp #23
    Jenin (PS)

    Rfugee camp? Palestine? Unless they lied on the registration I doubt this is RIAA.
  • by Giant Ape Skeleton (638834) on Friday October 03, 2003 @10:58AM (#7123927) Homepage
    It's not a bug, it's a *feature* !

    ;-)

  • can someone tell me how they planned to make money? let's see: give away sw, give away movies. i must be missing something.
  • by pirhana (577758) on Friday October 03, 2003 @10:59AM (#7123940)
    This is a good example which shows again and again that any closed source is inherently not trustable. When you are installing a proprietory software, you are basically trusting them not to screw you up or put any back door. Nobody has any guaranty that windows or any other closed source software is free of this issue. Safe bet is to stick with open source software exclusively.
    • While I agree with the principle behind this argument, this is like saying you'll never get behind the wheel of a car unless you bought all the parts yourself and built it yourself based on freely available plans.

      After all, there's probably a GPS tracking system, data recorders that records the times when you're over the speed limit, and other potentially privacy-compromising system hidden in any car you buy.

      Do you trust the drinking water coming through your pipes? What, you filter it first? OK, have y

      • by pirhana (577758) on Friday October 03, 2003 @12:46PM (#7125040)
        Let me clarify my point. Have you ever heard of any back doors in any open source software ? very less(if at all any). Now, have you heard of any back doors in commercial softwares ? Many. Just compare the P2P applications itself. Many of the closed source ones were alleged to have spywayre, backdoors etc(Kazaa and now this one for example). Was there a single case of such incident in open source alternatives ? I dont think so. So my point is that, the chance to find a back door in an open source software is close to zero. But thats not the case in closed source ones. Untill and unless proven otherwise by incidents, this argument will remain valid. I will not say that open source software is panacea or anything like that . But they are inherently more OPEN and transparant. In closed source software , you are trusting a SINGLE company which is not a good idea IMHO.
  • by wingnut2600 (657362) on Friday October 03, 2003 @11:00AM (#7123952)
    I heard about this yesterday from a posting by Random Nut (the individual that discovered this exploit as well as earlier security holes in Kazaa) on Zeropaid.com (forum link: http://www.zeropaid.com/bbs/showthread.php?t=15259 ).

    The security exploit is being tested by members of the p2p community and has been shown to be a viable exploit (forum link: http://www.p2pforums.com/viewtopic.php?p=20323#203 23)

    The operators of ESV have been slow to directly answer questions regarding this exploit:(http://forums2.es5.com/index.php?act=ST&f =40&t=5645&s=1ec6bf29bb73061ed185cbc3018f04b8) . Registration required to view forums, but it is worth it! The ESV forums are interesting since they make allegations of other site's involvement with the RIAA, MPAA, etc. yet have included a questionable exploit in their own software. These forums are rife with rhetoric and double-talk of Orwellian proportions.
  • Scenario 1:
    Maybe this is not malicious. Possibly a way to protect people in the event that something bad happens, like all this hyped anonymity and encryption turns out to be trivial to crack. ES5 may have already developed a worm that spreads and exploits this function to delete all shared files on the network, which may be in the users' best interests.

    Scenario 2 (aka Conspiracy theory 1):
    Orrin Hatch is making good on his promise to destroy the PCs [slashdot.org] of filesharers around the world, while placing th

  • If Intellectual Property theft isn't really theft because IP isn't really property, then Intellectual Property damage isn't really damage because IP isn't really property.

    If you really feel that IP ownership is bogus then this malware isn't really a problem because at worst it only destroys your Intellectual Property and not anything of real value. So, anybody who takes this off their computer doesn't really believe that IP doesn't have actual value and thus admits that IP theft really is theft.
  • The following students have all won Bicycles!
    Please report to the broom closet to collect your prize!

    Sounds just like that. All the movies you want, but once you've signed in, and proven you're simply stealing, they delete all your files, THEN sue you. It's a clever plan, too bad they got caught.

  • by Doobian Coedifier (316239) on Friday October 03, 2003 @11:30AM (#7124281)
    ...with their next bandwidth bill:

    $ wget -O /dev/null http://download.es5.com/es5us.exe
  • I was suspicious (Score:3, Insightful)

    by techsoldaten (309296) on Friday October 03, 2003 @11:41AM (#7124392) Journal
    I was suspicious of this project from the beginning. The way they market their product, promising immediate access to copyrighted items, was just too rosy and would leave any company wide open for litigation. This passage in the announcement pretty much sums up my take on the whole affair:

    "The question then is 'why did they do it?' I'm sure they won't tell us, but here's a theory: They could be working for the RIAA, MPAA, or a similar organization. Once they have enough users on their ES5 network, they would start deleting all copyrighted files they own which their users are sharing. The users wouldn't know what hit them."

    Can anyone come up with a plausible scenario where a P2P company would release software that destroys a computer, if it is not connected somehow to these groups?

  • Called it. (Score:4, Insightful)

    by 72beetle (177347) on Friday October 03, 2003 @11:46AM (#7124445) Homepage
    Told ya. [slashdot.org]

    -72
  • by DickBreath (207180) on Friday October 03, 2003 @11:50AM (#7124498) Homepage
    Forgive me for even thinking the unthinkable. But please indulge me for a moment. Consider the hypothetical possibility that one of the *AA evil twins might create, build a website for, and promote some "anti-*AA" software. Imagine that it is a trojan horse. You let it into the city gates. It seems to be what you think it is. But at night, out comes the invading army through a secret door.
    • I only wish it were, and I only wish the RIAA were to actually delete a file on my computer.
      That would place them in such an actionable position that I would probably have to beat back lawyers from my door with a broomstick.

      I am not a lawyer, but I would venture to guess that an act such as the RIAA using an application to delete files from my computer to violate several laws, at least in my state:
      unauthorized electronic trespass into a computer system
      criminal destruction of private electronic d
  • I tried ES5 some time ago to see whether it worked or not.

    It was such junk that I uninstalled it without even managing to find a single thing, illegal, legal, whatever.

    If the application was designed to get a community and then hurt them, it is a real failure.

    What I suspect is that the people behind ES5 really are a bunch of half-mad Russian programmers paid by oil-quaffing Saudis, who actually believe that their application rocks. And they planned to get 15m users, then approach the highest bidder, advertisers or *AA, selling the captured market. The "encryption" stuff is just to make it impossible to reverse-engineer ES5 clients, and the backdoor is just there to up the ante for selling their shit to the *AA.

    A poor plan, horribly implemented.
  • by AstroDrabb (534369) on Friday October 03, 2003 @12:59PM (#7125223)
    This just goes to show that you can not trust closed proprietary code. It is pretty weird that these ES5 guys would come out the way they did with big mouths. Either they work for the RIAA/MPAA or they *wanted* to be a target. I think it is the first one. If you are going to share files, make sure that you

    1. Use open source applications only.
    2. Share files that you have the legal right to share.
    3. If you do share some illegal file, see 1.

    There are 1,000's of songs out there that can be legally shared, and there are tens of thousands of files/applications out there that can be legally shared. Share those and dump the RIAA/MPAA all together. There is a good Open Source P2P app out there called giFT. It can connect to OpenFT, Gnutella and Kazza (FastTrack). giFT [sourceforge.net]
  • by Anonymous Coward on Friday October 03, 2003 @01:09PM (#7125359)
    hey there,

    im an israeli.
    and to tell you the truth, i was a bit afraid to post any comments last time since i didnt want to get into the heat of the argument.

    i just wanted to reveal some details regarding the state of the internet in palestine in an objective manner since i belive the cassual slashdotter might have percieved it wrongfully.

    palestine is currently in a semi anarchistic state. which means that most of its people do not have an internet connection at their disposal.

    a few years back israel started to provide palestinians with internet services.
    we thought that it would do good to open their minds to other world perspectives and international media. we still have no clue regarding the outcome :)

    afaik isps are very limited in palestine and most internet infrastructure is used for academic and government purposes. all internet traffic from palestine passed through israel, im uncertain whether this is true to this day, you can easilly check it.
    so yes its our fault such things happen and so im terribly sorry that it is being put into bad use.

    i would highly doubt that internet is available at jenin. jenin is a refugee camp in which people are forced to live in sub conditions which means,
    its probably one of the last places to have internet in palestine. therefore, i would presume the whois is fake.

    if a palestinian indeed wrote that software he would either be:
    a. a student in one of the universities.
    b. an arab israeli (the 20% of israeli population that live within us in peace which the media never mentions a thing about).

    also, ras kabir is a fake name. it means
    "big head" which means, the man in charge or someone who likes to take care of business.

    and just to ensure you we were not the ones to write it :)

    the israeli p2p app is a hacked version of kazaa lite ;)
    (which is a hacked version of kazaa located at
    http://www.kazaa.co.il)
    although only a low percentage of israeli p2p users actually use it. and it doesnt encourage piracy like es5.

    thats pretty much it, im sorry if i hurt anyone
    if you have any questions feel free to ask,
    just take into mind that im not into starting any flame wars in the proccess.
  • RIAA/MPAA "honeypot" (Score:5, Informative)

    by raresilk (100418) <<raresilk> <at> <mac.com>> on Friday October 03, 2003 @02:22PM (#7126145)
    When Slashdot initially ran the Earthstation V article, I posted a warning that this looked an awful lot like an RIAA/MPAA "honeypot" to me. Everybody ignored me, because they were too busy giving high-fives to Earthstation for bravely taking on the RIAA, etc. Now we learn that Earthstation has exactly the "feature" the Content Mafia would put in a honeypot - the ability to delete content off of your machine. I guess all of us (or at least some of us) are as gullible as the Content Mafia think we are.

  • On topic (Score:3, Insightful)

    by edxwelch (600979) on Friday October 03, 2003 @09:53PM (#7129872)
    When the origional Earthstation slashdot story came out, it ws claimed that this software had more movies and software than any other p2p system and was more secure.
    I posted what was one of the few on topic posts, and asked if anyone had actually used this program and if it was any good.
    Some kind slashdotter responded that it was very buggy and already installed many viruses on his PC and on that note I gave it a wide berth.
    Meanwhile everyone else in the discussion was totally engrossed in the Isreali - Palestinian flamewar and seemingly forgot what the origonal story was about.
    The moral of this all is:
    Well, stay on topic and you might learn something, but then again, fuck it, a good flamewar is always fun too!

"The chain which can be yanked is not the eternal chain." -- G. Fitch

Working...