Amazon EC2 Enables Cheap Brute-Force Attacks 212
snydeq writes "German white-hat hacker Thomas Roth claims he can crack WPA-PSK-protected networks in six minutes using Amazon EC2 compute power — an attack that would cost him $1.68. The key? Amazon's new cluster GPU instances. 'GPUs are (depending on the algorithm and the implementation) some hundred times faster compared to standard quad-core CPUs when it comes to brute forcing SHA-1 and MD,' Roth explained. GPU-assisted servers were previously available only in supercomputers and not to the public at large, according to Roth; that's changed with EC2. Among the questions Roth's research raises is, what role should Amazon and other public-cloud service providers play in preventing customers from using their services to commit crimes?"
That's silly. (Score:5, Insightful)
"what role should Amazon and other public-cloud service providers play in preventing customers from using their services to commit crimes?"
The same role that Ford Motor Company is responsible to fill in preventing the use of it's vehicles as Getaway cars from scenes of crimes.
Re:That's silly. (Score:4, Funny)
"what role should Amazon and other public-cloud service providers play in preventing customers from using their services to commit crimes?"
The same role that Ford Motor Company is responsible to fill in preventing the use of it's vehicles as Getaway cars from scenes of crimes.
Eh, more like the same role that a chauffeur is responsible to fill in preventing the use of it's driven vehicles as getaway cars from scenes of crimes.
After all, once Ford makes a car they're done, right? EC2 is continually crunching numbers until it's cracked.
Re: (Score:2)
Eh, more like the same role that a chauffeur is responsible to fill in preventing the use of it's driven vehicles as getaway cars from scenes of crimes.
After all, once Ford makes a car they're done, right? EC2 is continually crunching numbers until it's cracked.
I say they should be the equivalent of a common-carrier. Let the government get a warrant if they want to snoop on the work someone does or to force amazon to cut them off. Otherwise keep on crunching just like the phone company keeps on connecting phone calls of drug dealers.
Re: (Score:2)
Re:Offensive (Score:5, Funny)
Re: (Score:3)
How come you never age?
If you are going to troll like this try aging your character.
Re: (Score:2)
Re: (Score:2)
The same role that Ford Motor Company is responsible to fill in preventing the use of it's vehicles as Getaway cars from scenes of crimes. I think it's slightly different. Once Ford sells a car, they are done (except for warranty work). This is more like Ford providing assistance during the heist. The robbers are actively using the service in the commission of the crime. Also, the type of car is irrelevant. Or no car at all. Cracking the WPA in this instance can't be done without using Amazons service.
This would be like Ford giving road-side assistance during a heist. The tow-truck guy doesn't know the occupants are criminals, but if they see 20 bullet holes, a bleeding guy in the back, and maybe some curious looking bags... reporting it is simply being a good citizen.
Note the difference between Ford's tow-truck driver reporting what he saw and Ford monitoring all cars looking for those leaving a bank in a hurry.
Re: (Score:2, Interesting)
This would be like Ford giving road-side assistance during a heist.
No, it's like Jared Loughner taking a taxi to the site of his shooting spree:
http://www.nytimes.com/2011/01/11/us/11taxi.html?partner=rss&emc=rss [nytimes.com]
The taxi driver is just providing his usual service at his usual price and has no indication that a crime is going to be committed.
Similarly, Amazon knows you're doing a lot of heavy computation, but that is one of the reasons someone would use Amazon EC2.
Re: (Score:2)
I think it's slightly different. Once Ford sells a car...
So then its more like a rental car, if I'm a white hat cracker.
And I expect it will be like a stolen rental car if I'm black hat and steal someone elses amazon account / credit card to get access.
After all crooks typically use "fraudulently obtained" getaway cars too. So even if meticulous records are made for each car they aren't generally all that useful.
Re: (Score:2)
Like using the GPS to help them find a good route to their getaway destination.
The article is 100% wrong about the availability of gpu instances. So this is definitely possible without Amazon's service. Amazon's service is just making it cheaper.
Re: (Score:2)
Re: (Score:2)
They probably stop them altogether - it's against their ToS to use the services for unlawful purposes.
Re: (Score:2)
They probably stop them altogether - it's against their ToS to use the services for unlawful purposes.
The automakers who can slow down a car involved in a high-speed chase is not unreasonable to me. That's because it would occur at the direct request of the police. That request, in turn, would happen only because a crime has been committed (attempting to elude police). What I would consider unreasonable would be if the police slowed down or stopped random vehicles with no probable cause or direct knowledge of a crime in progress.
If Amazon only scrutinized users at the request of the police, and only w
Re: (Score:2)
No, I don't want Amazon to interpret the law. Parent said:
Perhaps Amazon should then slow down servers that the police inform them are involved in illegal activities?
Re:That's silly. (Score:4, Insightful)
There are perfectly legal reasons for cracking encryption...
Data recovery (eg forgotten passwords)
Security auditing
Crypto development (ie stress testing)
Re: (Score:2)
Re: (Score:3)
Because if it's a question of whether a crime has been committed, we already have trained professionals who specialize in dealing with this exact scenario: we call them police. They have restrictions on when and how they can gather evidence for some really, really good reasons. Amazon doesn't belong in the law enforcement business.
They shou
Re: (Score:3)
Wonder how safe longer keys are... (Score:3)
I wonder with the ways that WPA2-PSK is being eroded, if one should just go with 30+ character long keys. TrueCrypt always recommends to go with 20+ character passphrases and since there isn't much key strengthening with WPA2-PSK, a longer key is a good thing here. My preference is to use a 63 number of letters and digits, and if it gets forgotten, just generate another string and paste it into the router from a machine on the wired network.
Re: (Score:2)
Re: (Score:2)
Charecter set ^ password length = permutations.
You're right with exponential growth.
Just remember that if your password has password dictionary fragments, including all common substitutions, then the length is the number of fragments, not the number of characters.
20-character (Score:5, Informative)
It's actually 20 random characters that are recommended for use as cryptographic keys. The reason for this is that 20 random keys from the US keyboard has the same number of possible combinations as 128 random bits. If you use anything less than 20 random characters, even if you use a 128-bit encryption algorithm, you won't have 128-bit encryption. The same is true if you use 20 non-random characters. A brute-force attack would try passwords with words or phrases before going for the really random stuff, so you again don't have 128bit encryption.
Also fun to realize: for every character less than 20, you lose 100x your security. A 19-character password could be cracked in just 1% of the time of a 20-character password. A 10-character password would take .000000000000000001% of the time.
That's not correct (Score:2)
Reason is the key you provide isn't used directly on a competent cryptosystem. It takes a hash of the key. So the key is always the requisite number of bits for the system, even if it is actually too long or too short.
Now you are correct in that shorter keys are faster to crack, however in a system like that you can't just straight out brute force the raw keys. You have to take the passwords, hash them, then test that. That takes longer.
Re: (Score:2)
Not always. [wikipedia.org]
Access points use the SSID as the salt, and most APs use common default SSIDs.
Re: (Score:2)
Not here - most people get their routers from their ISP, and they generate a new SSID for each (ISP name + 4 alphanumeric characters).
Re: (Score:2)
If you know the source password is less than a certain length (ie less than the keysize), then thats what you attempt to brute force instead of the derived key... Go for whichever (actual key, source password) has the least possible combinations.
Re: (Score:2)
Wrong. A brute-force attack of crypto cipher created from hashing a password is performed not by going after the hash result, but by going after the password. The computation of the hash from the password is O(1), so it doesn't actually take any longer.
Re: (Score:2)
No, it's not. Constant time is insignificant compared to exponential time.
Re: (Score:2)
There are some fairly notable error margins in your figures. Taking the claim that 20 characters have 128 bits of entropy, we get a character set of size 85, which is plausible (a-zA-Z0-9 plus 23 punctuation marks), but then each character less than 20 loses a factor of 85 rather than 100, and reducing by 10 characters has one fifth of the impact on the key space that you calculate.
I personally prefer to stick to alphanumerics, avoiding oO0iI1S5Z2. 23 characters gives me more than 128 bits of entropy.
Re: (Score:2)
You seem to have forgotten that your keyboard has a shift key. There are 96 characters on a US keyboard, not 85. This number is close enough to 100 that my statement is damn accurate.
Re: (Score:2)
What is a "random character?" Is the letter 'c' random? There's no such thing. PROCESSES are random -- values are not. If you took a perfect, uniform random number generator, used it to generate a password, and it spat out "password123456", there would be nothing wrong with that. In fact, if you start imposing rules like "randomly generate a password but then exclude it if it contains an English word" then you are actually HARMING the randomness of your process.
Re: (Score:3)
Welcome to the world of cryptography, kiddo! "Random" is a fun word. Here's an example of some random numbers: http://www.dilbert.com/fast/2001-10-25/ [dilbert.com]
Need more? http://www.amazon.com/Million-Random-Digits-Normal-Deviates/dp/0833030477/ref=cm_cr_pr_product_top [amazon.com]
For the purposes of cryptography, though, random (obviously) means 'unpredictable.' Or, more specifically, it means it is impossible to write program which generates passwords devised using your scheme without going through, on average, half the keyspac
Re: (Score:2)
Your comment is based on false information. There are more than 88 characters on a US keyboard.
Re: (Score:2)
Your comment is based on false information. There are more than 88 characters on a US keyboard.
It's hard to use the break key, arrow keys, or the function keys for password or passphrase characters though.
Re:Wonder how safe longer keys are... (Score:4, Funny)
I hear that Chuck Norris just uses his name as the key. When anyone tries to crack it their computer catches fire.
Re: (Score:2)
Re: (Score:2)
I hear that Chuck Norris just uses his name as the key. When anyone tries to crack it their computer catches fire.
Chuck Norris doesn't need keys. His name is sufficient to tell people to stay away
Re: (Score:2, Interesting)
This link has the actual test http://stacksmashing.net/2010/11/15/cracking-in-the-cloud-amazons-new-ec2-gpu-instances/
Which looks like a single dual fermi EC2 instance gets 250M hashes/sec which is crazy. So assuming you have a 100 instance cluster of them:
40 bits of random : 43 s (~ 8 chars)
45 bits of random: 23 mins (~9 chars)
50 bits of random: 12 hours (~10 chars)
64 bits of random: 23 years (~13 chars)
Better start using pwgen 14 for your passwords.. For WPA-PSK I actually use this:
$ python
>>> im
Re: (Score:2)
I wonder if it gets logged? Get the main computer and read the logs for much the crypto used?
Re: (Score:2)
Just make sure you have a character outside of hexadecimal in your WPA2 key, and it gets hashed up to a full length key anyways.
Re: (Score:2)
Oops. The article is about WPA, not WPA2.
Upgrade already, you damn stupid crackheads!
(random shit for /. filter: lksjdgkhjgjh)
Re: (Score:2)
If you use a 63 character, full ascii key, which is quite realistic since this is a key, not a password, then the time quickly rises to galactic scales.
Crisis averted.
Does using a longer key need more overhead? Significantly?
Re: (Score:2)
Not that I've noticed.
I use a passphrase on mine, which actually results in a full length hexadecimal key (ie, the largest you can use with WPA2-PSK). I've not noticed and significant overhead.
Re: (Score:2)
Oops. The article is about WPA, not WPA2.
Upgrade already, you damn stupid crackheads!
Re: (Score:2)
Not that I've noticed.
I use a passphrase on mine, which actually results in a full length hexadecimal key (ie, the largest you can use with WPA2-PSK). I've not noticed and significant overhead.
Ohhh, I use a "passphrase" too, I didn't realize that's what it did... now I feel a little silly...
Wikileaks (Score:5, Insightful)
Amazon provide infrastructure services. They need not, should not, must not know or seek to know how these services are used.
Oh wait, Wikileaks...
Re: (Score:3)
You forgot one.... cannot.
Firstly, they can't, reasonably audit all code going into the system by hand. This leaves some sort of automated code check, or monitoring the workloads in some way. Simple size of the workload doesn't help, that could be anything.
You could watch for library calls to hash functions but, they are easy enough to implement and get around that.
Even if you could detect the fact that I am hashing strings over and over again, you still wouldn't know why I was doing it. Am I researching ha
None? (Score:5, Insightful)
They should not take any steps in this direction. We should have learned that. it. just. don't. work. Brute-forcing a hash is not illegal anyway. If the customer of amazon decides to misuse the result, than this is not the responsibility of Amazon. Many services and tools can be abused for crime.
Re: (Score:2)
Finally, someone talking sense. And with the steady drop in memory prices, it is even affordable.
Mod parent +1 ( Genius )
Re: (Score:2)
I think they should be required by law to only process non-evil bits. The implementation is trivial: just add an extra "evil" bit to every bit.
We can do better.
Add a couple of bits and use them for ECC - Evil Cleansing Code - that way you can make sure that if any evil ever gets in to the system it is automatically cleaned out.
Easy answer (Score:5, Insightful)
what role should Amazon and other public-cloud service providers play in preventing customers from using their services to commit crimes?"
No role whatsoever; let law enforcement agencies handle criminal investigations.
Re: (Score:2)
If you criminalize super computers then only criminals will have super computers.
I mean really people. I can buy guns, knives, and cars off of which can be used in crimes. I do not see anyone suing Glock.
Re: (Score:2)
I do not see anyone suing Glock.
http://www.washingtonpost.com/wp-dyn/content/article/2005/10/20/AR2005102000485.html [washingtonpost.com]
Well I Can Answer the Last Question (Score:5, Insightful)
Among the questions Roth's research raises is, what role should Amazon and other public-cloud service providers play in preventing customers from using their services to commit crimes?"
None whatsoever. Amazon and other service providers are retailers. They are not a police force. If a crime is being committed, let the designated authorities (i.e. cops) investigate it, police it, and arrest the criminal. No business should ever be involved in policing anything. That's a role specially held for the executive branch of governments.
Re: (Score:2)
Among the questions Roth's research raises is, what role should Amazon and other public-cloud service providers play in preventing customers from using their services to commit crimes?"
None whatsoever. Amazon and other service providers are retailers. They are not a police force. If a crime is being committed, let the designated authorities (i.e. cops) investigate it, police it, and arrest the criminal. No business should ever be involved in policing anything. That's a role specially held for the executive branch of governments.
Although I agree with you, the store owner that sold John Wayne Gacy facepaint probably received some unwanted scrutiny after JWG was outed. The person who sold ammo to the guy who gunned down the congresswoman is probably sick of being pursued by TV cameras. Amazon, however only has to face the occasional lawsuit or lawmaking. There are consequences, but no inherent moral or legal obligation.
Re: (Score:2)
While amazon doesn't have a legit role...socially...Well...I think we have to admit they have some role in practice--or will.
No, they don't have a role. If the police, or FBI, or whoever need access to Amazon's resources to prosecute a legitimate criminal that is likely using Amazon's services for criminal activity, then said police entity needs to obtain a legal warrant just like they do for anything else. If the warrant is obtained legally, then Amazon, by law, must comply with the warrant and turn over all data required by the warrant. That is fine. That is legal. That is how the system is supposed to work. If Amazon resists
None (Score:2, Redundant)
They cannot arguably be capable of defining what actions being taken with an EC2 instance are and are not crimes, therefore they should not even attempt to do so. It is not, after all, their duty to do so.
They can refuse service to those who they feel are suspicious, or cut people off if they violate some generic ToS, but surreptitiously cutting in because they think someone is committing a crime (and cracking WPA is not a crime), only runs them the risk of false positives.
More importantly, if they really f
Le Gasp (Score:2)
You can buy computer time to compute things! What will they think of next!
None. (Score:2, Redundant)
Breaking news! Tools can be used for anything!
Do you require pre-approval to use a hammer since it can be used to kill someone? What about the knives in your house?
Just like the phone company they should pay no attention to what their systems are being used for.
Trying to police it is a waste of resources. They start looking then people will start obfuscating the data. If I send you a big pile of data in no noticeable format (since I've grabbed only the stuff I need and catted it together) and a bunch of
Re: (Score:2)
Breaking news! Tools can be used for anything! Do you require pre-approval to use a hammer since it can be used to kill someone? What about the knives in your house?
Guns, cars, and just about anything else that provides an "obvious" means of inflicting harm on others fall into the same category, but undoubtedly-well-meaning folks always manage to get them regulated.
Prevention or Reaction? (Score:2)
I'm not certain how Amazon would be able to prevent such activity before it happened, aside from code snooping, which is probably in violation of the terms of their services agreement. Perhaps profiling would be in order before accepting someone as a customer, but how would you protect yourself against shell companies acting on behalf of a known abuser? Rather, I think the question should be "how quickly can Amazon react when this occurs".
ISP's and hosting providers have had to face similar situations for
This is so not news. (Score:2)
Someone took a password-guessing program and ran it on EC2. Big freaking deal.
EC2 now offers GPUs. Someone took a GPU-based password-guessing program and ran it on EC2. Big freaking deal.
True, raw SHA-1 used all by itself is not the thing to generate password hashes with, but this is not a weakness in SHA-1. As the researcher says, it shows merely that SHA-1 is efficient.
SHA-1 is not weakened, broken, or exploited in this research (it is significantly broken in other ways though).
Teams were guessing
What about LED "wireless" networks? (Score:2)
Oh, about 6 seconds for that security travesty, I reckon. 4 seconds, if setup by faulty Windows Admins.
HA! Mr. T is still laughing at you, only harder this time.
The pricing is wrong (Score:2)
Either the guy is lying or the pricing is wrong, from the TFA is says they charge 28 cents a min, but from the amazon ec2 pricing page it says [quote]Pricing is per instance-hour consumed for each instance, from the time an instance is launched until it is terminated. Each partial instance-hour consumed will be billed as a full hour.[/quote]
also to get 28 cents/min you would need to run 8 instances at $2.10/hour so really he paid $16.80 not $1.68
Re: (Score:2)
What role should they take? None, maybe? (Score:4, Insightful)
I would expect Amazon to cooperate with the law enforcement should they discover that their service was abused to commit a crime. But why should they required to "avoid" it? And most of all, how? The only way to really keep people from using that service for criminal means would be to explicitly disallow certain uses and then monitor whether it is used this way. And that in turn raises a question: How? Because one of the core reasons this service is interesting is that it offers cheap calculation power. If you attach a metric ton of red tape and surveillance, it's most likely cheaper and faster to let your old Pentium do it.
Hands Off (Score:3)
Cloud services need to avoid any type of actions that create the illusion that they may be responsible for what users do. As long as they never have any editing of any uses of their product they will probably not be held liable by the courts. In a way it is like the truck driver that opens the trailer door and sees what he is delivering. As long as he does not know what is in the trailer the law will not charge him with transporting illegal or stolen items. Intent and knowledge are locked together. Don't look, don't see and don't know.
Math... (Score:2)
... is not a crime!
Re: (Score:2)
WPA, not WPA2 (Score:2)
WPA is obsolete and has been. Use WPA2. [wikipedia.org]
Legacy WLAN hardware (Score:2)
Re: (Score:2)
I've actually never seen a WPA network before. I've only ever encountered WEP and WPA2. Is there anywhere that has a large WPA network deployed? WPA was an interum solution intended to work on old WEP hardware.
That said, another person is claiming this attack works on WPA2 as well, so no win anyway :)
Re: (Score:2)
If using TKIP/PSK (like most home users, and all my neighbours), there is no difference [wpacracker.com]:
Re: (Score:2)
This is wildly overstated as a risk (Score:5, Interesting)
Re: (Score:3)
The great majority of passwords don't have anywhere close to the entropy of "eight random characters drawn from the 96 character printable ASCII repertoire". Probably a great many passwords can be successfully guessed in a reasonable amount of time at 400K trials per second.
here [korelogic.com] are the results from the last Defcon 18 contest.
Re: (Score:2)
Passwords, yes. But there is a good reason to keep passwords short: one has to type them in regularly. Wifi passphrases are things one generally only ever types in once,* so there is no reason not to make them as long as the OS will allow. Mine is over 40 characters long; it has some structure in order to be memorable, but I don't think anyone will brute force it in the near future.
* Or twice, if you are using an obsolete and poorly designed operating system.
Depends on Who You Ask (Score:5, Funny)
...should Amazon and other public-cloud service providers [be liable for] customers [...] using their services to commit crimes?
Hope this helps...
The problem is not EC2 (Score:3)
The problem, as one of the referenced articles points out ans as has been known in the crypto-community for a long time, is fast key-derivation functions. Even the original UNIX password encryption function already took that into account and iterated the key derivation function to make attacks take longer. Typical methods used today for example iterate a second or so on the target CPU. This is a compromise between needing one second per unlock and requiring one second per brute-force attempt on an equivalent CPU. GPUs still make that attempt problemantic, but one application of SHA1 takes something like 0.1 microsecond on a modern CPU, so it should at least be iterated 10'000'000 times or so. Even with that, SHA1 is a bad choice, as it is too simple. Use something that requires a full-blown CPU to work and that a GPU cannot easily do. Of course, high-entropy passwords also help a lot by enlarging the search space.
But in essence, EC2 GPU instances can only break Crypto for cheap that was badly implemented anyways. That is not really a surprise. There are far too many people out there that do crypto without even understanding the attack possibility, let alone being cryptographers.
The same moronic reaction (Score:2)
That notion has universal appeal. It is simple enough that practically all voters understand it. It is compatible with most people's moral code, at least in principle. It lends itself very easily to law-and-order populism and electioneering, and of course anything that increases the use of police forces and prisons is popular with several major lobbying organizations. One problem, though: it only occasionally works. This is aside from any legal and civil rig
Really (Score:2)
According to the back of this envelope, an eight digit upper case alphabetic key would take a worst case of $2436.32 for his algorithm to crack. What sort of shitty pre-shared key is he attacking? Or is my envelope wrong and I suck?
stop using non-random passwords (Score:2)
People need to stop using non-random passwords for WPA2-PSK. This attack sounds like a dictionary attack, because there is no way at only 400k passwords per second that he could map more than a minuscule fraction of the 2^256 key keyspace. We are talking 1e77 potential passwords. At 400k/sec that only amounts to 1e13 passwords per year. It will still take 1e64 years to break. Since the universe is only ~1.5e10 years old, I think we are safe enough from a true brute force attack.
Of course that assumes peo
Re: (Score:2)
Re: (Score:2)
Because many people already have such GPUs for playing games, and yet very few people play games 24/7...
It's quite feasible that someone could play games during the day, and let their GPU do cracking at other times.
Re: (Score:2, Insightful)
"In the same amount of time" is the biggie. They are talking about using short timeslices of hundreds of computers. The article mentions using 400 GPUs (but isn't very clear on whether 400 GPUs for 20 minutes is what costs $1.68). If that's true, then decoding it with a single GPU would take about 5 1/2 days, assuming you had the same class of hardware Amazon is using.
Not earth-shattering amounts of time, true, but if speed is of the essence you probably don't want to wait the better part of a week.
Re: (Score:2)
Re:Why use EC2? (Score:5, Interesting)
Re: (Score:2)
for normal cluster computing you want high IO between instances (doing some math this guy was running 8 of these instances to get the numbers he was achieving, so to answer the grandparent, you would need to buy 16 Teslas to get the performance he is getting)
Re: (Score:2)
Tell that to Napster.
Re: (Score:2)
Every time we talk about sensible law someone comes in with a counter example out of the area of copyright and patents.
Please, in case you haven't noticed yet, the insanity in copyright and patent laws is only rivaled by sex laws. Let's hope at least the rest of the legal codex at least retains a bit of reason and connection to reality.
Re: (Score:2)
Re: (Score:2)
cracking an encryption key is not a crime.
Using a cracked encryption key to seal data is a crime, and that hasn't changed.
You might want to re-read the DCMA again. They can charge you for the act of bypassing or facilitating the bypassing of protections. Just as John whats-his-face who broke the DVD CSS "encryption"
Re: (Score:2)
Re: (Score:2)
Amazon doesn't know what the computations taking place on the CPUs/GPUs they lease are doing.
They could be searching for oil deposits, searching for radio signals from ET, recovering lost keys for a legitimate owner, for law enforcement, or for bad guys. They could be doing several of those things simultaneously and it would take very time consuming, deep, by-hand expert research to try to figure it out and you'd still never be sure you understand what all the numbers mean.
Amazon probably doesn't even k
Re: (Score:2)
They certainly don't know whether or not it's used to host material leaked from govt sources legitimately into the public domain or who and who isn't a journalist.
They don't, unless that customer trumpets their use of the service in that manner to the world...
Re: (Score:2)
That's a very good point.
I tend to think of someone's use of EC2 as public info, only a "whois" away.
Security researchers like to use EC2 because it's cheap, and it's hard to block network scans from since it shares a netblock with other mission-critical stuff like, say, Twitter.
It's likely that industry journalists would have made a big deal about Wikileaks using it had they not pointed it out themselves.
I still can't tell if this is a keyword placement-piece for EC2 or if somebody really does thin
Re: (Score:2)
it's hard to block network scans from since it shares a netblock with other mission-critical stuff like, say, Twitter .
OMGWTFBBQROFL!
Re: (Score:2)
A lot of people have a very hard time with inductive reasoning, so they don't easily arrive at a general concept. Here, the general concept is that most useful tools can also be abused for malicious purposes. Each instance of this general concept makes news headlines for some reason. Usually it then splits into the usual "us vs. them" set of two camps: one calling for something to be
Re: (Score:2)
Excuse me? Since when is the maker of a tool liable for its misuse? Did they change a law when I, Smith and Wesson were not looking?