Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Just How Paranoid Are You? 931

An anonymous reader writes "We all understand the need for security in a corporate environment. Personal computers, however, typically don't have nearly the amount of sensitive information (or it's at least less damaging if found). How far do you go to protect your computer? I recently went overboard on securing my information (at least as secure as Windows XP can be). I have a hardware firewall (GTA GB500), 30 character password, and all remotely personal information stored on a 256bit AES encrypted volume. How far do you go to protect your information against 'Big Brother' or even your family/friends?"
This discussion has been archived. No new comments can be posted.

Just How Paranoid Are You?

Comments Filter:
  • by DigitalCrackPipe ( 626884 ) on Monday January 24, 2005 @04:03PM (#11459533)
    If you're really trying to keep things secure, ensure your encryption isn't made by microsoft. Their encrypted folders use AES (IIRC) but since they're open and decrypted when you're logged on the protection is compromised.
  • I use linux (Score:1, Interesting)

    by Anonymous Coward on Monday January 24, 2005 @04:03PM (#11459534)
    So beyond a hardware firewall, not using credit cards on the net and banking through https, I don't do shit.
  • This far (Score:5, Interesting)

    by js3 ( 319268 ) on Monday January 24, 2005 @04:03PM (#11459541)
    I lock the door to my house when I leave home
  • Big Brother... (Score:5, Interesting)

    by djsmiley ( 752149 ) <djsmiley2k@gmail.com> on Monday January 24, 2005 @04:04PM (#11459569) Homepage Journal
    Is there any point in trying to protect against BIG Brother really? I mean, if they WANT to get in, they could just storm your house and take away your PC. If the want they could slience you too. So why go so over the top?

    Another idea is to make sure any sensitive infomation doesn't have any means of escape, hell build a machine with no network, and no floppy drive or cd writer. Take out the usb slots too, then maybe a passer by wont be able to access it.

    30char password? Whats the point? I mean you can still brute force it, and even without doing this, theres still methods such as removing the hdd drive, mounting it under anther computer and 99% time, you got instant access to everything.

    People need to learn, senstive data is only protected in ONE place, inside our minds.
    Keep it there and no one can snoop it.
  • by syousef ( 465911 ) on Monday January 24, 2005 @04:09PM (#11459672) Journal
    The only things I really consider private on my computer are financial information. Receipts, credit card numbers etc. So yes I do go to some trouble protecting that, but for the most part I couldn't care less if my information was read illegally. There's just nothing of consequence there.

    If someone actually compromised and trashed my PC on the other hand, I'd lose time in rebuilding it. HoweverI do back up my information regularly, so that's no issue either except being annoyed at the loss of time. (If someone made subtle changes to the information I'd still have older backups, so it would be painful but not unrecoverable).

    If you truely need a private information store, it may be worth buying a PC that isn't net connected and that is physically secured. For the average person unless you're doing something illegal or have sensitive work material at home (arguably not a good idea anyway), why would you need a super-unbreakable encrypted PC?
  • Re:Yeah, right (Score:1, Interesting)

    by Anonymous Coward on Monday January 24, 2005 @04:12PM (#11459725)
    They need a unique ID in their database for a primary key?

  • Re:Yeah, right (Score:3, Interesting)

    by WormholeFiend ( 674934 ) on Monday January 24, 2005 @04:14PM (#11459764)
    That's what they want you to THINK!!! 8-I
  • Paranoia quotes (Score:5, Interesting)

    by dazedNconfuzed ( 154242 ) on Monday January 24, 2005 @04:17PM (#11459817)
    Paranoia Quotes

    I was walking home one night and a guy hammering on a roof called me a paranoid little weirdo. In morse code. -Emo Phillips

    No matter how paranoid I get, it's never enough to keep up.

    The question is not whether I'm paranoid, it's whether I'm paranoid enough.

    The truly paraniod are rarely conned.

    Doesn't matter if I'm paranoid - they're still after me.

    I sincerely believe people talk about me. Mine would be a pretty meaningless existance if they didn't.

    Why are some people terrified of "black helicopters" and don't even notice that they are being monitored almost constantly by the whole network of obvious surveilance cameras, credit cards, ATMs, EZpass, company ID/access cards, magazine subscriptions, SSNs, taxes, fees, video rentals, Internet firewall recording, 'cookies', ... ?

    Paranoia: the belief that someone cares.

    Paranoia is the belief in a hidden order behind the visible.

    When everyone is out to get you, paranoia is only good thinking.

    "Paranoia is knowing all the facts." - Woody Allen

    "Paranoia is just another word for longevity." - Laurell K. Hamilton, The Laughing Corpse

    "Perfect paranoia is perfect awareness."

    "Paranoia is reality seen on a finer scale." - Philo Gant, Strange Days

    "The issue is not whether you are paranoid, the issue is whether you are paranoid enough." - Max, Strange Days

    "Why are you so paranoid, Mulder?"
    "Oh, I don't know. Maybe it's because I find it hard to trust anybody." - Scully & Mulder, The X-Files, "Ascension"

    Paranoia strikes deep / Into your life it will creep / It starts when you're / always afraid. You step out / of line, the man come and / take you away.

    "I don't agonize over decisions as much these days. The criteria of what's important to me is clear. The insecurity that you feel, and the paranoia that you feel, have been around for a long time -- you know it's a liar because it's been lying to you all along -- every time you start something new. You get used to it, and you sort of go, 'Oh, you're showing up again, well f*** you.'" - John Cusack

    Freedom is just a hallucination created by a pathological lack of paranoia.

    Paranoia doesn't mean the whole world really isn't out to get you.

    If you ever wanted to know what a person with acute paranoia looks like, just keep watching.

    I have the power to channel my imagination into ever-soaring levels of suspicion and paranoia.

    Paranoia is heightened awareness.

    Paranoia is a social disease--you get it from screwing other people.

    "Paranoia is the delusion that your enemies are organized." - Arthur D. Hlavaty.

    "This is the Nineties, Bubba, and there is no such thing as Paranoia. It's all true." - Hunter S Thompson

    "There are two kinds of paranoia: Total, and insufficient. I am both, because if you think you are sufficiently paranoid, you're not." - Guildenstern, Rosencrantz and Guildenstern are Dead

    "The truly paranoid are clever enough to not *act* paranoid." - Q, Star Trek: The Next Generation

    "When everyone _is_ out to get to you, being paranoid isn't going to help." - Q, Star Trek: The Next Generation

    "When did you get so paranoid?"
    "When they started plotting against me." - The Paper

    "Paranoia is only the leading edge of the discovery that everything in the world is connected." - `The Illuminatus Trilogy'

    When you've been through everything I have, paranoia is merely a precaution!

    Paranoia is not the belief that everybody's out to get you -- they are. Paranoia is the belief that everybody's conspiring to get you.

    The greater the concentration of power, the greater the paranoia it generates about its need to destroy everything outside itself.

    I love this job. Nothing like paranoia and neurosis. Who needs a Coke habit? I've got journalism!!

    There's something inherently American about paranoia. Given the i
  • Interesting tidbit (Score:2, Interesting)

    by Anonymous Coward on Monday January 24, 2005 @04:18PM (#11459838)
    I took a class on Digital Forensics taught by a person who has worked with law enforcement as a forensic specialist and when we covered the topic of FS encryption he mentioned how Microsoft was going to make it harder to get into the boxes when they introduced new encrypted file systems. Then he went on to say that law enforcement was working with Microsoft and coming up with efficient ways to get around this encryption for forensic purposes. I was thinking "WTF I'm absolutely never going to trust Windows to encrypt anything." Not that I probably would have anyways, but still.
  • Re:Physical access! (Score:5, Interesting)

    by gunnk ( 463227 ) <{gunnk} {at} {mail.fpg.unc.edu}> on Monday January 24, 2005 @04:20PM (#11459877) Homepage
    Generally, a "hardware firewire" simply means a device dedicated to working as a firewall whereas a "software firewall" means a program running on the computer to be protected. It does not imply that a hardware firewall does not have a software component.

    I run both a hardware and a software firewall. If one is compromised the potential intruder finds yet another. My sensitive data is also all encrypted, so even if the intruder breaks the second one he/she isn't likely to get much of value.
  • by Short Circuit ( 52384 ) * <mikemol@gmail.com> on Monday January 24, 2005 @04:21PM (#11459887) Homepage Journal
    I used to type commandlines into PuTTY in ROT13, to fool keyloggers at work triggered by certain non-work-safe phrases.
  • This type of discussion really worries me for "single owner" systems.

    You have setup a system that will keep people away from the data unless you and only you try to access this. What happens if something happens to you. Your family might need your account numbers if you die, have a stroke, etc.

    If you are protecting your child porn stash, then maybe this is the best solution. For things like credit card numbers, on-line banking, etc. you should "escrow" your passwords somewhere so that others can get to them if needed. This could be as simple as a printout of your passwords/accounts in your safe deposit box to having information kept by your lawyer.

    Remember that bad things can happen beyond just hackers trying to get data.

    And I am not just trolling for karma. My wife just had a friend die suddenly and one of the first questions from the family was "how do we get his laptops password". My anser was, "it depends, if he really secured it well, you are pretty much out of luck".
  • Knoppix STD (Score:5, Interesting)

    by Bruzer ( 191590 ) on Monday January 24, 2005 @04:28PM (#11460008) Homepage
    Good topic. I wish there were more serious posts so the rest of us could gleam some knowledge from the replies instead of the geeks trying to be funny.

    We had a couple people leave work recently and they had some data in the computer that we needed to get ahold of. Since my company requires passwords and restrictive permissions on all Windows systems my team was worried that we might never get the docs off the systems.

    A co-worker got out the Knoppix security tools distribution ( http://www.knoppix-std.org/ [knoppix-std.org] ) CD and was able to bypass the Windows passwords very easily. And it read the hard drive ignoring windows permissions.

    If someone wanted a secure system. The Knoppix STD CD could be a good tool to use. Try and see if you or a trusted friend could get in to your PC.

    - Bruzer (trying to be constructive)
  • Simple Practices (Score:4, Interesting)

    by thed00d ( 822393 ) on Monday January 24, 2005 @04:31PM (#11460038) Homepage
    Here are some simple policies I practice:
    1. Unless currently being used, the computer remains at an "off" state.
    2. Change your passwords often - how often is up to you, but be reasonable. I suggest 30 to 60 days for medium/low security, and 7 days for higher security. Remember, however, that any password can be breeched - it's just a matter of time.
    3. Segregate your network (if you have one) into zones. For Instance - You should not put your wireless access point straight off your network, instead, come off of your firewall in a new "wireless" zone. Terminate all wireless connection into your firewall via ipsec. Do not rely on WEP/WPA.
    4. Block all outbound and inbound ports on your firewall, until you need them. I.E, don't just open up port 80 because you /think/ that you /might/ just run a web server.
    5. Virus scanner.
    6. Password protect /does not/ imply encrypt.
    Anyway, these are just some basic concepts that are OS independent, and if your average user followed some of these guidelines, we'd all be in a better position.
  • Paranoid Vs. Smart. (Score:3, Interesting)

    by jellomizer ( 103300 ) * on Monday January 24, 2005 @04:34PM (#11460089)
    Being smart is knowing if you leave your system unprotected it will get broken into by a virus or hacker, worm... But you don't go crazy for every little thing. This is akin to Locking your door at night and leaving a light on in the hallway. This will stop most probles.

    Being Smart:
    • Having an external dedicated firewall, with all the ports closed, unless you need them.
    • Except for Windows use an other OS. OS X, Linux, xBSD. This may not be possible due to the need of additional software
    • Dont use IE when possible and espectilly when you are browsing untrusted sites.
    • If you are using windows get some good anti-virus software and anti-spyware software.
    • Choose what services you really need on your OS and disable the ones you don't need
    • Run the software firewall too. Besides the extra level of protection (say a virus from an other system on your intranet) it helps keep extrainious network data flowing over your network.
    • Use SSH SFTP when possible, as well https whenever you are entering data you don't want to be read.
    • Backup your data incase of a problem
    • Keep your software up to date


    Being paranoid is making your system as close as unusable as possible because of all the security turned off. This is like living in a fortres with Steal walls, doors, and bars over the windows and every type of lock possible. Going to crazy could lead to a false sience of security. As well as making yourself more of a target for people who see all the security setup and figure if it is that tight something good must be inside. If you are that afraid of hackers turn your computer off unplug it and put in a safe you are probably better off that way.
  • by baudbarf ( 451398 ) on Monday January 24, 2005 @04:38PM (#11460140) Homepage
    You've just given me, and everyone else, a detailed list of attacks which will not work against you (saves us time, thank you!), and presuming that you've given an exhaustive list, you've also told us what holes are in your methods and where they are. You've given us some hints as to your software packages (Qmail, FWReport, IPTables, Apache, mostly non-windows machines) so we can go look up bug reports and exploits for them...

    One gaping hole in your security is lack of obscurity. Security by obscurity is, indeed, bad practice; but the abandonment of obscurity altogether is generally worse. This is a tip that the big government agencies would give you, if they weren't so tight-lipped about their tight-lippedness.

    Then again, we're all prone to the occasional brag, it's the best way to social-engineer your way into a good understanding of your mark's system. For myself, I've resisted the temptation to gloat about my awesome system today, in response to this article, but I know I'll give in sometime later.
  • by yope ( 656090 ) on Monday January 24, 2005 @04:40PM (#11460158)
    How do you know it doesn't have a backdoor? How do you know your PC doesn't secretly "phone home" one day? You could never be sure about that, since you don't have the source-code to your OS! How can you call yourself a paranoid when you're using XP? Real paranoids don't use commercial software... real paranoids write their own OS!
  • Removable media. (Score:4, Interesting)

    by blanks ( 108019 ) on Monday January 24, 2005 @04:48PM (#11460288) Homepage Journal
    What the author did was serious overkill.

    The simple solution (for personal computers) is removeable media like a external USB harddrive. Connect it to your PC when you need to access sensitive information. Yes this dosent help if your system is all ready compromised, but if this has all ready happened chances are your fucked either way.

    This also works well with portable computers, but using memory sticks. if your in a insecure area (cafe) and need to leave your laptop for a few moments, just take the stick with you.

    It sounds like the author focused on securing his data only while hes not accessing it, like the encrypted data and silly long passord, but when hes all ready logged in, and the data is decrypted, your security is lossed. And the fact that most people leave their machines on (while logged in) this dosen't help in anyway.

    His computer is only secured while he is logged out, and his computer is turned off, but still not physicaly secure.

    Chances are if your in an enviorment that is not secure, this is your first mistake, and really if you have information that is this important, why the hell are you connecting that machine to the internet anyways.
  • Re:Physical access! (Score:3, Interesting)

    by BenEnglishAtHome ( 449670 ) on Monday January 24, 2005 @04:52PM (#11460360)
    The problem with stressing physical access is that physical access is the one thing you can't protect if some evil guvment TLA agency gets you in their sights.

    The massive encryption key you keep on the flash drive hanging around your neck will be seized when you get hauled in for questioning. The computers you use will be examined, cloned, and examined some more.

    What the truly paranoid need is a way to protect data under the assumption that the data storage medium absolutely WILL fall into the wrong hands. It doesn't matter if the data is irretrievably lost, it just needs to stay indecipherable to keep you out of jail.

    Any ideas for operating under those assumptions?
  • Re:This far (Score:2, Interesting)

    by cjmnews ( 672731 ) <cjmnews@yahoo.com> on Monday January 24, 2005 @05:00PM (#11460483) Homepage
    I really only go two steps further.
    My wireless network uses WEP.
    My access point restricted to particular MACs
    Only to keep potential free-loader neighbors off.
    • Microsoft firewall: off
    • Active spyware checking: not installed
    • Threats for using IE instead of Mozila/Firefox [mozilla.org]:non-existent
    I guess I trust my relatives, and I have backups of everything, so have at it.
  • by Lumpy ( 12016 ) on Monday January 24, 2005 @05:04PM (#11460540) Homepage
    Back in my ol' hacking days I had 1 laptop that never EVER was in my house that all hacking was done with. it never had anything on it that could attach me to it (yes, I used gloves when handling it ALWAYS) and never EVER used floppies to store any of the information on it. Zenith minisport, it used 2 inch floppies so it was impossible to get more of them anyways.

    All my 'Sploits were on that machine and I never used it or hacked from in the town I lived in.

    This was all back when I was a wee one, and is my distant past. but I learned from some of the best (a friend was a 414 member) and one thing that was instilled in me was to be insanely paranoid.

    to the point that where I had the laptop stored I had ways of detecting if someone had been there.

    if it looked like someone was there abandon it and never EVER return.

    His father was Ex-CIA and he was one of the very few that were not nabbed when they took 414 down. no I never knew his real name and no I do not know where he is or have had any contact with him for over 20 years now.

    basically his help in telling me to be insanely paranoid kept me out of the law's hands until I finally grew out of it and left the illigitmate stuff for the other newbs. (note social engineering is far more fun and will nab you LEGITIMATE access to things, and it's a key talent that will get you very far in the corperate and business world... the ultimate hack is getting the sysadmin to give you an account.)

    things like installing back to back modems in offices you find access to their phone closet, (Man I had to have at least 8 of those around) tapping lines and installing outside line access and YES even making rubber handset couplers to couple a pair of payphones together for some 1200bps goodness that would make tracing you harder than hell. (put the modems in a box make the box cut power to both modems when it is opened so you know when someone discovers your redirect, that is a first warning that they are tracing you, telephone guys are clumsy and will start poking around back then, they never had any FBI agents that were well versed in telephone equipment until recently.. Using a telephone gear box to conceal your modems works best, and makiing it look like 10-11 phone lines enter that box also makes it more tempting to open it first.)

    SO basically, acting pretty much like a spy would, expecting danger at every turn and NEVER giving others information, espically not friends that od the same thing, is as paranoid as I was.

    it kept me from getting caught and out of Jail. although I never did anything illegal, nothing at all, I was a perfect student that did not even own a computer!

    I also have no idea who reprogrammed the Altairs in the computer lab to flash their led's in a cylon eye sweep!

    but oh man it looked so fricking cool!
  • OpenBSD server (Score:4, Interesting)

    by alan_dershowitz ( 586542 ) on Monday January 24, 2005 @05:07PM (#11460584)
    I have a box dedicated to file storage only. I secure it in the following manner (well, in the process of doing so.)

    1. I run OpenBSD and know how to admin it. It runs ONLY SSH and Samba. It's behind a software router, runs pf.
    2. Samba will only be accessible on the loopback interface.
    3. Connections to the machine are made via SSH, you must have both a password and a PK authentication. The client has to port forward the appropriate ports for Samba to work.
    4. Firewall scrubs packets (prevents some potential TCP/IP exploit tricks)and only allows connections to and from my internal network and my machine at work from the outside.

    And that's it. I don't think this would work with more than one machine serving files via Samba, because of port forwarding. I haven't gotten the Samba attached to the local interface yet, right now samba is just limited to the single client I access files from via the firewall. I'd be curious if anyone has issues with the security of this setup. Basically, I want Samba, but with the stronger authentication and encryption of SSH.
  • Re:Physical access! (Score:3, Interesting)

    by dpilot ( 134227 ) on Monday January 24, 2005 @05:15PM (#11460715) Homepage Journal
    I'm not at all concerned about physical access to my computers, for two reasons:
    1: I just don't have any data THAT critical on them, and plan to keep it that way.
    2: If anyone is attempting to gain physical access to my computers, that means they're IN MY HOUSE, and in that situation, I'm much more concerned about my family. The computers then are simply somewhere in a line of physical possessions I'm less concerned about than my wife and kids.

    Perspective. I guess if I kept valuable company data at home, I'd be more concerned.
  • Re:Paranoia quotes (Score:3, Interesting)

    by Goo.cc ( 687626 ) on Monday January 24, 2005 @05:36PM (#11461058)
    >Paranoia is the belief in a hidden order behind the visible.

    Wow, I would have labeled that as religion.
  • by Anonymous Coward on Monday January 24, 2005 @06:14PM (#11461543)
    I have often thought that it would interesting to secure some of my personal data with GPG or some other form of encryption, but you have to write the decrypted data somewhere to use it. Then you have to consider that the information could end up being mirrored in the swap file or some temp file.
    OpenBSD can optionally encrypt swap (vm.swapencrypt.enable).
    I don't know if I'm supposed to talk about it, but some of the OpenBSD developers have been working on hardware solutions for realtime encryption of data going to and from RAM, anything leaving the on-chip cache would go through an AES chip using a temporary session key.

    If your temp files always live on MFS, temporary data will only exist in RAM or in swap, and with the above solution, when the system is shut down the data in those two locations becomes unrecoverable when the sesion keys are flushed.

    And I thought I was paranoid!

  • Re:Physical access! (Score:3, Interesting)

    by Atzanteol ( 99067 ) on Monday January 24, 2005 @06:17PM (#11461574) Homepage
    Any idea how to bring UP an interface under Windows without assigning it an IP address? I've been trying to figure out how to do this lately.

    The equivilent of "ifconfig eth0 up" (no IP assigned).
  • Re:Physical access! (Score:2, Interesting)

    by SupremeTaco ( 844794 ) on Monday January 24, 2005 @06:41PM (#11461838)
    While you're at do:

    dd if=/dev/null of=/dev/hda

    At least I think that's how it goes. I'm a linux n00b. That one shouldn't affect your printer much.
  • Re:Big Brother... (Score:3, Interesting)

    by swilver ( 617741 ) on Monday January 24, 2005 @07:27PM (#11462421)
    Ah, I found a way around that. Everything on my linux machines of value is heavily encrypted. It uses a password of 30 characters for this encryption. The password is unknown to me, but I can find it by opening my computer case and reading it on a set of 30 dice I have stored inside it.

    The idea is that if you turn the machine off, and move it (and you're not VERY careful moving it), the dice will fall and the password will be lost forever. That oughta show Big Brother when they try take my stuff by force!

  • Re:Physical access! (Score:1, Interesting)

    by Anonymous Coward on Monday January 24, 2005 @10:37PM (#11464036)
    Hardware firewall? What, it's built all from gates and has no code on it? There's no such thing.
    Wrong. [slashdot.org]
  • by boodaman ( 791877 ) on Tuesday January 25, 2005 @12:52AM (#11464970)
    I have quite a bit of I.T. value in my home...software, hardware, and data. One thing I take extra care to do is make sure none of my neighbors have any clue just what I have.

    For example, when I bought my house and moved in, every single piece of computer gear was put in an anonymous box without labels before being carried in. The boxes were unpacked out of view of any windows, and I arranged my shelving and desk in such a way that nothing is viewable from a window or door.

    I also made sure to warn my neighbors to stay away from my German Shepherd (she's a fantastic watch dog). Not that a dog is foolproof against someone determined to get access, but it doesn't hurt to present as difficult a target as possible.

    Keeping your stuff obscure via net access is all well and good, but don't forget about John Q. Public walking by on your street, or a nosy neighbor peeking through your window.

  • by Lumpy ( 12016 ) on Tuesday January 25, 2005 @07:51AM (#11466475) Homepage
    I "opened my coat" because it has been 20 years, AND I gave no information that is useable in any way. I mentioned no names and only one specific that is a complete dead end.

    I only mentioned things that were known to people at that time who were inside and running the gamut for real, and the fact I was a litle kid at the time absolutely nothing is actionable. There are details that are certianly gone from my memory, and there are locations that I hacked from that do not even exist anymore. There are aspects of the ol' "hacking" craft that most of the newbies miss and the number one aspect is the paranoia, ESPICALLY paranoia of your "friends" because in hacking circles your friends will rat your arse out faster than the feds can say deal. Most "hackers" today (Gawd, I despise that term.), are there for the show, the "peeps" and the "props". They think they become popular, they go to 2600 meetings and brag, they buy the "secrerts of hacking" books and think owning a copy of the "anarchist cookbook" makes you a big gun.(It makes you dead, most of what Is in that is completely wrong) It's an insane joke to those of us from the olden-days.

    We never wore all black or dressed "punk", or did anything to bring attention to ourselves. The number one thing you want to do is blend in. If you are able to simply close up your laptop (something that drew gobs of attention then) and turn around and walk away to disappear into the crowd you increase your chances of getting away 100 fold than the kid sitting at the phone booth with flame red hair wearing all black or even worse a stupid trench coat or bondage pants (sorry kids, those existed in the 80's!) looking like a "HERE I AM" beacon. If there is anyone looking for you you will be insanely easy to spot and follow. I learned early, if you look different you are number one suspect. If you look different they assume you are up to no good, and if you look different you can not hide in the shadows or better yet, in plain sight.

    I took advantage of that in high school. Every time something went haywire I was never even a suspect. My public persona was the upstanding and respectful honor student.

    As for your comment, I though the movie "Hackers" was insanely bad and funny. Absolutely everything was wrong. Most of what they showed was the punk scene from the 80's updated to look hip for the 90's. Pagers were a dead giveaway that you were up to something in the 80's.. yet that movie had them as a prominent piece of "hacker gear".

    The rest of that movie was a complete and utter joke, absolutely nothing set in reality. In fact I have never seen the end of it, I left the movie theater 1/2 way through. I couldn't stand any more of it. as a movie it sucked, and it completely butchered the topic.

    In reality I did not open my coat, because wearing a coat was a dead giveaway.

    Releasing some basic information that has no real inside information is certianly not "opening your coat"...

Happiness is twin floppies.

Working...