TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Judge Rules FBI Must Reveal Malware It Used to Hack Over 1,000 Computers

234 pointsby 56kabout 9 years ago

7 comments

boosting6889about 9 years ago
The Justice Department contends that the act of viewing a child porn image revictimizes the child each time the view occurs and is the basis for arguing that viewing child porn is not a victimless crime. Yet the FBI seized a server and allows such images to be downloaded and viewed thousands of times over a 2 week period. This would be like seizing the operators of an underground rape dungeon where patrons pay to rape children - and allowing such an establishment to run for 2 extra weeks to catch the patrons, regardless of any collateral damage that occurs to innocent children as a result. People would be up in arms over this. So, does viewing an image of child porn cause additional harm to the child in the image or not? Which is it? (This of course excludes instances where the viewer is paying/supporting production of the material)
评论 #11141947 未加载
评论 #11141221 未加载
评论 #11141822 未加载
评论 #11152262 未加载
评论 #11143116 未加载
评论 #11142253 未加载
评论 #11142239 未加载
moyixabout 9 years ago
Unless this is different from the shellcode they used when taking down Freedom Hosting, I&#x27;m not sure what releasing it would do. There are already numerous analyses of the code:<p>- Vlad Tsyrklevich: <a href="http:&#x2F;&#x2F;tsyrklevich.net&#x2F;tbb_payload.txt" rel="nofollow">http:&#x2F;&#x2F;tsyrklevich.net&#x2F;tbb_payload.txt</a><p>- Gareth Owenson: <a href="http:&#x2F;&#x2F;owenson.me&#x2F;fbi-tor-malware-analysis&#x2F;" rel="nofollow">http:&#x2F;&#x2F;owenson.me&#x2F;fbi-tor-malware-analysis&#x2F;</a><p>- My own analysis based on running it in PANDA: <a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;ReverseEngineering&#x2F;comments&#x2F;1jpln2&#x2F;has_anyone_else_taken_a_look_at_the_shellcode&#x2F;cbh1qpe" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;ReverseEngineering&#x2F;comments&#x2F;1jpln2&#x2F;...</a> (you can also get the recording of the shellcode executing and step through it here: <a href="http:&#x2F;&#x2F;www.rrshare.org&#x2F;detail&#x2F;26&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.rrshare.org&#x2F;detail&#x2F;26&#x2F;</a> )<p>It&#x27;s not big, and we have a pretty good idea what every piece of it does.<p>Of course, I suppose we don&#x27;t know that the malware it used in this case is the same as the one in the Freedom Hosting case, so I guess it would be nice to compare and contrast them.
评论 #11142674 未加载
spdustinabout 9 years ago
Imagine a later hardline: &quot;FBI Ordered to Reveal the Code Used to Backdoor San Bernadino Suspect&#x27;s Phone&quot;
评论 #11140336 未加载
评论 #11141179 未加载
评论 #11141941 未加载
评论 #11140542 未加载
Shivetyaabout 9 years ago
I am more concerned that there is no limits to what they can do in regards to a honeypot (trap&#x2F;etc). You would think child porn would be one thing they would not go this far with.<p>Regardless, I think someone with expertise should be allowed to review any code developed by the government in such operations only to ensure it does not somehow violate the rights of innocents
评论 #11140573 未加载
bpicoloabout 9 years ago
&quot;Sure, here it is compiled to assembly and stripped of all comments.&quot; is sort of what I&#x27;d expect
评论 #11141202 未加载
singletonaccntabout 9 years ago
So the headline uses the word &quot;pedophiles&quot;, but in the article the word is nowhere to be found. Maybe that&#x27;s because this sting isn&#x27;t necessarily about pedophiles, but about people watching and trading child pornography. Using &quot;pedophiles&quot; only serves to reinforce the stigma of a already heavily stigmatized minority.<p>The word &quot;pedophile&quot; should be defined as someone with a sexual attraction towards children. It doesn&#x27;t describe behavior: people can choose to not act on the attraction, and many, invisible as they are, in fact do not. Also, the people operating and visiting that hidden service could have had other reasons for visiting. They are not necessarily all pedophiles.
评论 #11140855 未加载
评论 #11140751 未加载
评论 #11141344 未加载
评论 #11140500 未加载
评论 #11140396 未加载
评论 #11143076 未加载
ikeboyabout 9 years ago
URL should be changed to the source <a href="http:&#x2F;&#x2F;motherboard.vice.com&#x2F;read&#x2F;judge-rules-fbi-must-reveal-malware-used-to-hack-over-1000-computers-playpen-jay-michaud" rel="nofollow">http:&#x2F;&#x2F;motherboard.vice.com&#x2F;read&#x2F;judge-rules-fbi-must-reveal...</a>
评论 #11141134 未加载