What Do You Think of Online Vigilantes? 273
gwoodrow asks: "I'm a member of the (primarily) Mac community Spymac. I originally joined for the 1 gb of email, but eventually found myself joining in on discussions in the forum. Today, I received an email from a supposedly anonymous Spymac member ("supposedly" because the smart guy didn't mask his IP). Basically, it said that he or she had harvested 10,000 member screen names/email addresses from Spymac's pages and that this, paired with the ability to view individual member's profiles, created a major problem because of the extent of information so readily available. The email this person sent out and the forum discussion that follow are available here. All cracks and personal opinion about Spymac aside, what do Slashdot members think of online 'vigilante' justice?"
"Some viruses are released with little notes within that say things like - 'this is why you need to do X or Y to fix your software' Some hackers have also gained infamy by hacking a major system allegedly to help. Do you support such actions and why? Are virus/trojan writers, hackers, and spammers doing a noble deed or going about things in the wrong way? If you don't agree generally, are there exceptions when online vigilantes are fully in the right? Is the accessibility of vulnerabilities a good excuse to partake in such actions, or should there be ethical bounds regardless?"
Vigilantes, I support you! (Score:5, Funny)
Re:Vigilantes, I support you! (Score:5, Funny)
Re:Vigilantes, I support you! (Score:5, Funny)
Spring follows Winter follows Fall follows Summer follows Spring.
The moon follows its phases across the sky, the constallations move in the same patterns that they have for 10,000 years, and the planets dance the same waltz they have since the dinosaurs roamed the earth.
Yet none of these things is as predictable as a "127.0.0.1" joke in a Slashdot article about hacking.
Re:Vigilantes, I support you! (Score:2, Offtopic)
Not only that, but he also managed to debunk your claim before you even made it, by mentioning the term "dinosaurs". Unless you want to try and claim that dinosaurs never existed and begin to look like a silly lunatic in the meantime...
Re:cover all yer bases (Score:2, Offtopic)
The grandparent was obviously designed as a tongue-in-cheek joke, none the less.
Re:cover all yer bases (Score:5, Informative)
Doh. "might have screwed up"? I'll counter with "no it wouldn't". Care to explain why exactly that would have made it invalid, or skew results significantly enough to produce multiple magnitudes of order discrepancies? And your "Adam and Eve" angle was truly bizarre: are you claiming they lived in there for eons before that supposed 6000 year period started? Or that unlike the bible says, there was a specific, gasp, l Granted, similar excuses are rather common with fundamentals, but I'd expect more from someone who truly tries to convince crowd (Slashdot readers) that supposedly has stronger natural science background than the average US population.
Your comment is either fundamentalists sly take on abusing the (too) common relativist attitude of too many people (even educated ones have), or part of that apathic relativist agenda. "In fairness' sake, let's consider unfounded claims of one non-open minded party, no matter how easily debunkable they are" (as in trying to claim evolution a "controversial" subject when it's not one at all). That's not fairness, that's being gullible and letting fanatic minority abuse the good nature of people (well, plus bad self esteem less educated folks have WRT anything smelling of "science").
The debates between fundamentalists with their cemented views (having painted themselves in corner with fundamentalist interpretation of their holy book, be it bible, quran or whatever) and scientists (or people with strong natural science background) are uneven battles of wits, one side generally being unarmed. The end result is that "intelligent design" proponents end up pointing ostensible contradictions in tiny details, and trying to convince those completely derail whatever theory are railing against.
Finally, note that while I do consider fundamentalist believers bunch of ignorant cuckoos, I have no problem with normal pragmatic religious people. Most christians do NOT believe in literal interpretation of the bible; only the vocal minority in US of A tries to present different picture.
Wow you must be close (Score:2)
Re:Wow you must be close (Score:2)
dumbass windows user... the command is traceroute 127.0.0.1
Good Samaritan or Civil Disobedience, Not Vig. (Score:2, Informative)
If you know who it is (Score:5, Interesting)
Re:If you know who it is (Score:3)
Report him for what? He doesn't seem to have committed any crime. His email isn't spam (under CAN-SPAM), because it's not commercial. He threatens to send spam, but while that may be in poor taste, it is pretty obviously not a serious threat. I know he tried to hide his identity, but that is probably to avoid the wrath of Spymac rather than his fellow users.
I
Defined... (Score:2)
Vigilante: A member of a volunteer committee organized to suppress and punish crime summarily (as when the processes of law appear inadequate); broadly : a self-appointed doer of justice
Re:If you know who it is (Score:2)
No damage... (Score:3, Insightful)
Re:No damage... (Score:2)
A. Launch a 'small' virus into their system to get their attention. May not 100% get the company's attention and is bad all around anyway you look at it. But small.
B. He can launch a big virus and show the company he wants some attention for his w
vigilantes should not do damage (Score:2, Insightful)
Re:vigilantes DO damage (Score:3, Insightful)
Re:vigilantes DO damage (Score:2)
Re:vigilantes DO damage (Score:5, Insightful)
Second, that's part of a larger picture. If you get hacked by a script kiddee, and he only appears to get to your web server, the same questions apply. Are you lucky to get the wake up call from a mere website defacement insead of finding a trojan that's been sitting for months in accounts recievable? Possibly, but how do you know the intruder only got in as far as it first appears, and how do you know no one else better than him hasn't done more? I'ts all a spectrum, from a vigilante who really didn't screw up anything, to one who accidentally did some damage, to a web site defacement that's easy to fix and relatively harmless, to harvesting personnel information for head hunters, to harvesting customer information for spam lists, to the most serious crimes that can cost a company millions.
Anybody who falls victim to one of the less serious sorts can breathe a sigh of relief that it wasn't one of the worse ones, and for their blood pressure's sake they probably should, but they still need to think about what it implies about their chances the next time will be successful, and for worse consequences.
Re:vigilantes DO damage (Score:2, Insightful)
That's the point of the vigilante--if he or she can get in, that means someone else could have ALREADY gotten in and left things in there. If the vigilante can get in, then you already have to rebuild--it's just a question of whether you KNOW whether you have to rebuild. No point in killing the messenger.
Re:vigilantes DO damage (Score:2, Insightful)
Have you ever heard of the government doing that? They may investigate breakins that admins report, but they don't seem to do anything to confirm the security of the user's data that admins are trusted with.
No one likes a gadfly--but that's just how life works. Customers have a right to know if admins refuse to run secure systems.
Re:vigilantes DO damage (Score:2)
1. System is vulnerable
2. Evil Hacker X breaks into the system
3. Evil Hacker X installs a trojan
4. j00 1Z 0wn3d
5. A month later vigilante breaks into the system
6. Vigilante doesn't see the existing trojan
7. Vigilante tells sysadmin
8. Sysadmin finds trojan
9. Sysadmin blames vigilante
Now you can argue that "well, the vigilante obviously didn't place the trojan there, or else he/she wouldn't have told the sysadmin", but steps 5-8 are still enough for a company to consider civil
Re:vigilantes should not do damage (Score:2, Insightful)
i'll just kick your door in (Score:5, Interesting)
yeah, no, that sounds like a bad idea.
Re:i'll just kick your door in (Score:2)
There are a few big differences here:
First of all, after you've kicked in my door, it'll be damaged. You've done damage to physical object which I must pay for to get repaired, dispite your best intentions.
Secondly, you've intruded my house without my concent. You have violated my privacy in the real world. This is totally different from from breaking into a computer, because you shouldn't have expected any privacy anyway, if you hooke
Re:i'll just kick your door in (Score:2, Insightful)
Secondly, you've intruded my house without my concent. You have violated my privacy in the real world. This is totally different from from breaking into a computer, because you shouldn't have expected any privacy anyway, if you hooked it up to the outside world.
just doesn't work. That's like saying "Well, you didn't build a ten-foot-high wall around your house, thus completely sealing it off from the outside world, so you forfit your right to privacy.
Re:i'll just kick your door in (Score:2, Insightful)
Two interesting analogies but they're twisted together. They should be: 1) damage/theft to physical objects is the same as to digital ones; and 2) a third party who stores your objects has a duty to protect them.
So the first analogy says that breaking into my system really is the same as kicking down my door. You've done damage, tampered with my logs, broken executables, etc. Intent is irrelevant since the results are the same.
The second analogy is like the doctors' office. They have a duty to keep
More like turning the door knob (Score:4, Insightful)
Re:More like turning the door knob (Score:4, Insightful)
They seemed all freaked out and disturbed. The first thing I thought was that these guys won't make it in the real world, dealing with real problems, contracts, business deals and real life frustration. I understand not liking it, but if you read the actual forums, half the crowd is freaked out beyond all common sense.
These can NOT possibly be nerds. Most nerds I know have had a box 0wned once or twice, or a site defaced, etc. *Real* problems that had to be dealt with. But so someone has a list of your email addresses. I can simply wget the forums, write about 40 lines of code to grep out the user names, and build the same damn list.
Get over yourselves Mac/spy/wannabes.
What do I think? (Score:4, Interesting)
This is like me punching someone in the nose and saying "Why didn't you take karate lessons, for crying out loud? It's your own fault it's so easy for me to punch you. You should consider this assault a personal favor."
Re:What do I think? (Score:2, Insightful)
Re:What do I think? (Score:2)
I'm all for full disclosure. I think it enforces change and better practices, but I still think people poking around without consent is stupid at best. If you feel the need to test out security, _get permission_ from the systems owner or use a similar setup on your own system. You don't have to break the law to help. Too many people piss about doing damage in the name of being helpful.
Re:What do I think? (Score:2, Insightful)
(This is more like having sex on your first floor forgetting to draw the blinds and you get seen by some peeping Tom. The Tom is in the wrong but you're an idiot for not checking some minimal level of security.)
(Yes, if you someone ma
Re:What do I think? (Score:2)
so.. online vigilantes that break the law intentionally.. they're criminals, that's clear. but if you just stumble on something you're not supposed to and alert others of that it's not bad or even illegal.
Re:What do I think? (Score:2)
The idea is to get people to run secure systems(preferrably) or get them to make room for people that do run secure systems, because insecure systems cost us collectively, a lot.
Now the vigilante already got a reply from a site admin in the thread, that the matter was being looked into, it may or may not have been the first time they heard about
Assumption of anonymnity (Score:5, Informative)
Yes and No (Score:5, Insightful)
Re:Yes and No (Score:5, Insightful)
Re:Yes and No (Score:2, Interesting)
Although I don't suspect this to be the case, some people just don't get the fact that they are vulnerable until you slap them in the face with something big. I recently tried to show a client two exploits-- the bigger one was that I could sniff all the usernames and logins into his payroll DB, and the other was that that I could crash the client app and bluescreen windows. He was more impressed by the flashy blue scr
Re:Yes and No (Score:2)
Re:Yes and No (Score:2)
The alternative would be to have published that vulnerability publicly and place ourselves as accomplices to others who would use that vulnerability to cause them harm.
Let me see: money, t-shirts and keychains or a federal indictme
Re:Yes and No (Score:2, Interesting)
Sumbling is okay... (Score:5, Insightful)
Re:Sumbling is okay... (Score:3, Insightful)
I think a lot of people are missing what's happening here. This wasn't someone breaking into private servers - he just collected some data that was publicly available, used those usernames to make e-mail addresses, and pointed out that he could look up profiles that are also public and get a lot of information about people. There's nothing illegal here. Annoying, yes. Illegal, no.
Some of the people in that thread said that they had mentioned this before and it was ignored, so it's also not a case that
Re:Stumbling is okay... (Score:4, Interesting)
I also have done white-hat work. It is kind of polite to find those 'nice' hackers that will get in through a known hole and just put a HACKER_README in
I say this guy went a little far with 10k emails. I think 100 would have proven his point, but who am I to judge?
And another thing.... (Score:2)
Why are you doing someone else's work for them, for free?
I find it hard to believe that the white hats are really doing it out of genuine concern for Corporate America. If you are really that altruistic, why not build a secure system that others could use, rather than try to break someone else's? So you discover an exploit - how does that help anyone if you don't also volunteer your time to help secure their system? Wouldn't it be better to help them migrate to a secure OS (such as *nix) rather than
Do you know what the word "Vigilante" means? (Score:5, Informative)
From your description, it sounds like someone just... grabbed some published information and started threatening people with it. There's no indication in your writeup that this person was even trying to do something 'good'.
Re:Do you know what the word "Vigilante" means? (Score:2)
That's no vigilante. (Score:2)
Reading further, I guess this email is annoying, but not really illegal. I wouldn't say that the definition of vigilante is (yet) warranted from anyone's actions so far.
Speed of the Internet vs The speed of Justice (Score:5, Interesting)
1. It provides some deterrant
2. It forces law enforcement to step up to the plate.
Example? There is an on line porn site that has pictures of a girl, about the ago of ten having hard core sex with an adult. I found out because a domain I admin with a catch all e-mail was recieving bounces from this sites spam. I reported it. Nothing happened for a few days so I traced the actual source of the pictures to a freeserver. The pictures were removed in minutes, I continued to follow the sites from free server to free server until it stopped working (I haven't checked in a while).
I made that persons life more difficult and hopefully caused him to leave more "trails". Each free server admin I talked to said that they would save any logs that they had. Now why couldn't the police do what I did for the 2 weeks or so?
cluge
AngryPeopleRule
Re:Speed of the Internet vs The speed of Justice (Score:2)
If it had been a launder of money for an orginized crime outfit, they may very well have killed you.
2) It makes it harder for law enforcement to do their job. There is no reason law enforment needed to keep you informed of what they where doing. It could be irresposible to do so, especially if they had to keep track of telling you the information. Once that caught someone, the lawyer would have demanded a lo
Re:Speed of the Internet vs The speed of Justice (Score:2)
ObNitPick: The whole point of money laundering schemes is to turn illegitimate income into legitimate income. This leaves them with illegitimate money (because it is from the sale of child porn). Whatever this was, it wasn't money laundering. Anyway, murder is easier to investigate than an internet crime (more physical evidence). I applaud the poster for taking the risk.
Btw, I wouldn't consider what this poster did to be vigilantism. A
Re:Speed of the Internet vs The speed of Justice (Score:2)
You also assume it's illegal in the country of origin.
You're srewing with people who have demonstrated no morals, and you may have cost them money.
I'm not sure about the other point. Are you saying if the poster got killed, then it would be easier to get the people who put up the site? Seems like a hell of a thing to do.
Re:Speed of the Internet vs The speed of Justice (Score:3, Interesting)
They had better be a better shot than I. I live in a state where it is legal to defend myself.
2) It makes it harder for law enforcement to do their job.
I call BOVINE FECES
There is no reason law enforment needed to keep you informed of what they where doing.
I just asked them to do something, I do
As long as they wear...... (Score:5, Funny)
Maybe I'll misbehave a little to get some "punishment" ;-)
that picture (Score:2)
it'snot going to be a cat women movie, it's going to ba a crappy actreee posing in an awfull looking cat suit movie.
If I just want to see hot looking babes in latex, I'd go to google.
Slashdotting (Score:3, Funny)
Re:Slashdotting (Score:2)
no.
despite the fact that most sites cannot deal with the volume of hits that being featured on slashdot brings with it, most crave it... so much so that, in the past, some have hired people to submit stories directly to slashdot - and, when this has failed, have harboured people to build up mod points in the hope that their stories will be accepted by the slashdot editorial staff.
for the admins - this is also a good test of their webservers under high
That is not a vigilante (Score:2)
That is a hacker, and they are putting their skills to use in the wrong way.
A vigilante is someone who rights wrongs without authorization from the law. That would be like someone who breaks into the spammer's computer and rewrites their BIOS with the contents of their spam or something.
Re:That is not a vigilante (Score:2)
in their opinion of what is wrong. Sometime it's clear cut, mostly, no so much
If you think cutting down tree is wrong, and go blow up the local sawmill, you may feel your right.
Re:That is not a vigilante (Score:2)
Ebay Vigilantes (Score:3, Informative)
What you need is some real vigilantes. (Score:3, Insightful)
Back in The Old West, when the law was too week or two thinly spread out to control outlaws and bandits, various towns set up secret societies known as "Vigilance Committees." They took the law into their own hands, arrested felons and, when they had to, they executed them. Their members were known as vigilantes, and that's where the term came from. Today, mailbombing or otherwise DOSing spammers is a form of vigilante activity. Finding the electronic equiviant of a broken lock on a door and shouting out to the world, "Here's where you can get in for free!" is just plain stupid.
Vigilance != "vigilante" (Score:5, Interesting)
Vigilantes do more than just find problems. They act on their information, using their judgement to change the problem, supposedly into a solution. But justice is a specialized process, like science. When unqualified people engage in risky acts with dangerous consequences, they expose the rest of the community to unacceptable danger. Looking for problems, and telling us about them, protects us. Acting on one's own, especially without telling the rest of us, creates risks as severe as, or worse than, the "problem" being "solved".
Eternal vigilance is no vice.
(with no apologies to Barry Goldwater)
Victims in the UK.... (Score:2)
The guy that found this did everyone a big favour and ought to be congratulated, but sadly the spa
Police response (Score:3, Insightful)
Law enforcement is trying to get a better handle on internet fraud, but there's so much of it going on and they have so few resources to attack it that vigilante efforts to stop or mitigate the attacks are about our only options in many cases.
If I shoot a gun at a guy who's robbing a bank at gunpoint, I'm probably okay with the law. If I pull out my gun, close my eyes, wave it around, and pull the trigger several times at random, I'm not okay with the law.
If I get a guy in a headlock to break up a fight, I'm probably okay with the law. If he walks away from the fight and I put him in a headlock then, I'm not okay with the law.
You're generally allowed to do things to people you wouldn't otherwise be allowed to do if they weren't committing a crime, but you have to be certain that you're not doing these things to innocent people as well. The internet makes that quite difficult at times. You also have to restrain your response to be proportional to what you're trying to prevent. "Imperfect self-defense" can often get murder reduced to manslaughter, but you still do time for it.
Moreso, what do I think of SpyMac? (Score:2)
Compare SpyMac: It's like the shiniest used car in the used car parking lot - you know the one that's usually a lemon!
Am I reading the parent right? Someone harvested SpyMac email accounts?
I've done a few editorial articles on my website about this very thing. One on SpyMac problems and prediction that this kind of thing would happen and then another on how the SpyMac Community really latched on to a recent vigilante
Two types of online vigilante (Score:3, Insightful)
OTOH "vigilante" actions like writing viruses are a different matter. It's akin to street protests or graffitting public places with slogans. The first type of vigilante action is a matter of personal protection. The second type is to do with making a statement. Perhaps we should use as a yardstick the comfort level we have with street protests? When does a protest or making a statement go too far?
There is no centralized enforcement on the Net (Score:4, Insightful)
Some governments are just now awakening to the threats of these malcontents, and have passed laws against them. Of course, these laws are next to useless, because the net transcends international geopolitical boundaries.
So what is a decent net citizen to do? Nothing? Scream and cry until the lawmakers listen?
Until there is a real sheriff on the net, vigilante groups may be the only answer. Small groups of net-aware individuals who can root out the bad guys and administer some well-deserved justice. Some may call them net terrorists, but if they leave the good people alone, I would call them patriots.
Will the law go after these patriots? The law may turn a blind eye if these groups keep the peace. Besides, what can the law do to the net patriots that are trying to make things better when they can't even go after the malcontents?
I'm all for vigilantes, until we get a real sheriff in town.
Re:There is no centralized enforcement on the Net (Score:3, Interesting)
OK, so who should be the sheriff?
USA? Well, we invented the damn thing, but no. A single sovereign nation should not be censored by another(America) nation. No country should be given control.
Each nation does their part? Well how should Censorasia(a hypotheical nation) censor out information from a non-Censorasia based website?
UN: F* that. who gets to decide what is 'censored' or what is 'illegal' a bunch of politicians in a completely non-militaristic group? Th
Re:There is no centralized enforcement on the Net (Score:2)
For example, I spend most of my "vigilante" time going after crackers, US-based phishing schemes, and the occasional spammer. I really don't have time to browse the net for other wrong-doers. Presumably there are hundreds more like me, and very few who go after racist websites. Therefore the greatest effect is felt where it is needed.
In the end, though, I wish there wa
They are criminals, but... (Score:2)
Jeez! (Score:3, Insightful)
In a forum the size of spymac, members viewing this thread/online is useless - needle in a haystack style.
To get a gauge of popularity, why not have "number of members viewing this page" rather than the whole list?
If users want to know when their friends are online, then they could implement a vBulletin style "buddy list" in the member's control panel.
I think it's stupid (Score:2)
If you step in the ring, you have no right to cry when you get punched. You may think you're doing some fair and noble deed when you, say, grab the IP out of some trolls email post, paste it into your web browser and use the default login credentials to turn off their SOHO router. But what happens if everybody does this sort of thing? What happens when you annoy somebody and they do this to you?
The network and the online society becomes less valuable and beneficial when people start throwing rocks at
Astroturf vs. Astroturf (Score:2)
It is so hard to get a submission accepted by Slashdot, one would think the standards were v
Net Police? (Score:2)
GJC
Re:Net Police? (Score:2)
Let that wait. The police should have the authority to request (and receive) a search warrant that allows them to monitor and log the traffic form the suspect site. Having the authority to search an 80 gig hard drive might lead to a lot of work. Having the authority to monitor the traffic could turn out to be ridiculously easy. In addition, the l
vigilantes? (Score:2)
What does vigilantism mean in an online context? 1) spying out the home address of some spammer outside detroit and then publishing it? 2) white-hat breaking-and-entering of security syst
Honeypot operators are vigilantes (Score:2)
It continually amazes me that so many people are highly irate about net abuse and yet do so little to stop it when they could. Honeypot evidence could be used to convince ISPs that there's plenty they could be doing, too, without violating any laws and without violating any of the
Hmm? (Score:2)
But perhaps that is just semantic quibbling?
They're worse than the crimals themselves (Score:2)
Re:They're worse than the crimals themselves (Score:3, Insightful)
I'd love to see a little justice done to the big spammers, and to the 419 people. The law won't do anything unless enough money is involved to get the bureaucrats off their butts.
Jail time? wtf? (Score:2)
I wrote a harvester (Score:2)
It wasn't very well tuned at all, but when run, it found about 1,000 email addresses every hour on a PII-400, after filtering out the bogus addresses.
It would get caught in a harvester trap every now and then - which was easily overcome - it would only look thru 100 pages in a particular domain. There's plen
I'm not sure i see how this is a vigilante... (Score:2)
The extent of the damage caused seems to be an email sent to 10,000 of the users of spymac. I fail to see the problem. This isn't a 'hacking for good' or a 'worm to kill another worm'. It's a mass emailing telling people theres a problem. There is also nothing to suggest that someone in a position of power WASN'T contacted prior to the mailing.
So I'll say it again, what did this guy do wrong?
He doesn't deserve vigilantism; He needs guidance (Score:3, Interesting)
It seems to me that you're missing an important point of the guy's e-mail to you:
He sent you a warning.
And not only that; he probably sent it to everyone on his list of "thousands of member names". Don't you wonder why YOU of all people received it, having no previously existing relationship with him? It's because you *weren't* the only one who received it. At least two people who replied to your Spymac post had also received it, so you're obviously not the only one.
They guy was clearly concerned with a vulnerability at Spymac, not trying to take advantage of it. Don't you detect the mild sarcasm he used? They guy isn't recruiting accomplices; he's making a statement to members.
The guy says (paraphrased) that he just got hold of all this info. Coupled with [public member info] and [specific techniques], he could compile a very complete list of member data. Now, he says he could do [evil thing1], [evil thing 2] or [evil thing 3]... or, "or simply ask Spymac to GET THEIR ACT TOGETHER and FIX EXISTING PROBLEMS like this gaping security hole before they introduce ever new functions?? I should never have been able to get my hands on this!"
Uh, hello? That was a direct quote, with his emphasis, not mine. He's not a criminal (yet, anyway), and he doesn't deserve any kind of justice, vigilante or otherwise. He's simply made it blantently obvious to at least one user (you) of a service that their data is not secure.
Now, maybe it would be appropriate for you to contact the Spymac folks to make them aware of the issue. (If they aren't already, based on the fact that many of their employees probably have their own accounts, and that he's probably e-mailed quite a few people, if my assumption is not off.) It might also be appropriate to contact him directly (if possible) and make sure he's... "guided" to the proper methods for disclosure of the data to the applicable folks and deleting it. But to go after him for doing nothing more than producing an effective proof-of-concept... he doesn't deserve what you're asking about.
Of course, it's possible that he hacked their server... but it doesn't sound like it. He said "Played around the other day with Spymac and suddenly... I couldn't believe my eyes: A list with thousands of member names right there in front of me! " That *could* be hacking (perhaps some vigilante reconnaissance would be appropriate), but something makes me doubt it.
#startrekpl and script kiddies. (Score:3, Interesting)
Police ignored complains.
The Net Is A Public Arena (Score:2)
Second, the net is a public place. Anyone who posts any information on any site has no more expectaton of privacy than if they wrote the same information on a 3x5 card and pinned it to a bulletin board at the local mall or library.
You know, there's a book on my shelves that lists the names, addresses and telephone numbers of almost everyone in my city.(Bet you have one, too.) My God, think of the privacy implications....
Re:reportchildporn.com (Score:5, Insightful)
Problem is, without downloading it, how do you tell what's child porn? Don't tell me you can tell by the filename, because you can't. There are people out there who label ordinary stuff as child porn. I don't know why, maybe because that makes more people download it (??).
And if I had downloaded some, I'd delete it quick and not tell anyone, just in case. Call me paranoid, but too many people have got themselves in trouble by trying to help out lately.
Re:reportchildporn.com (Score:2)
Re:reportchildporn.com (Score:2)
Re:reportchildporn.com (Score:2)
Where does that stop? (Score:3, Interesting)
Do you go out LOOKING for violations of your morals so you can feel good about turning them in?
Hate to tell you but you also do things that others disapprove of, and are illegal somewhere.. Do you want to be next?
Unless you directly are confronted with a violation of the law, in your face, I say keep your nose out of others business.. Lest it
Re:Where does that stop? (Score:2, Funny)
Re:Where does that stop? (Score:2)
Just becasue it MIGHT go to far, doesn't mean it will. All's you are doing is reporting it, law enforcement will draw the line at what they go after.
Where do you draw the line?
Well, if I hear someone being beatin, I'll call the police. If my son had a friend that came over and had cigerette burns on his body, I'd call the police.
My point is, the world is full of people who keeping getting abused becasue other
There is a point (Score:2)
Not saying that we ignore our neighbors wife being beaten by the guy who broke into their house, but there is a line, and I think what was being discussed earlier on crossed that line...
Re:Wait, where's the secret info? (Score:2)
I'm pretty sure spammers use similar methods to harvest email addresses.
It's not exactly the most surprising or clever of attacks.
Personally, if I want to keep information private I don't submit it in the first place.
Off topic? (Score:2)
It mentions black hats,
Mentions old school technology,
It comes from a comic book,
and it's a pun!
It's not off topic. Funny? maybe, Irrelevant? yes, but not off topic.
Re:Not a fan (Score:2)
If more people where like you, then it wouldn't be a problem, but they aren't.
What do you mean "steal a script"?
Re:comissioner (Score:2)
What a stupid thing to wast mod point on.
I poed funn at an industry I'm in, used a comic theme, made a monty python reference, and referenced a previous slashdot story.
Thats not -1 'off topic'! it;s +1 'sheer Genius'!
In my day, people on slashdot had a sense of humor.