Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Networking Data Storage Technology

Grad Student Project Uses Wikis To Stash Data, Miffs Admins 268

Anonymous writes "Two graduate students at the Ivy League's Brown University built a P2P system to use abandoned wiki sites to store data. The students were stealing bandwidth from open MediaWiki sites to send data between users as an alternative to BitTorrent. There was immediate backlash as site operators quickly complained to the University. The project appears to be shutdown, but many of the pages still remain on the web. The project homepage was also taken down and the students posted an apology this afternoon." The same submitter links to two different forum discussions on the project.
This discussion has been archived. No new comments can be posted.

Grad Student Project Uses Wikis To Stash Data, Miffs Admins

Comments Filter:
  • by Anonymous Coward on Sunday April 12, 2009 @11:08PM (#27553063)

    Google Cache still has the old data.

    http://209.85.173.132/search?hl=en&q=cache%3Ahttp%3A//graffiti.cs.brown.edu/ [209.85.173.132]

    C&P of page text (in case the cache updates quickly):

    Graffiti Networks
    A Subversive, Internet-Scale Peer-to-Peer File Sharing Model

    Abstract:
    The proliferation of peer-to-peer (P2P) file sharing protocols is due to their efficient and scalable methods for data dissemination to numerous users. But many of these networks have no provisions to provide users with long term access to filesafter the initial interest has diminished, nor are they able to protect users from malicious clients that wish to implicate them in incriminating activities. We present a new file sharing paradigm that harnesses the potentially unlimited storageof the Internet as a third-party intermediary for peers to indirectly transfer data with each other. We base our decentralized architecture on the premise that users trust file sharing coordinators, but do not trust any other user. Our key contributions in this paper include an overview of the design for a P2P system that implements our new model and a discussion ofthe challenges that such a system will likely encounter.

    People:

            * Andrew Pavlo - Brown University
            * Ning Shi - Brown University

    • by fractoid ( 1076465 ) on Monday April 13, 2009 @05:45AM (#27554501) Homepage
      Next step; using Google Cache to stash data. :D
      • Or worse (Score:3, Insightful)

        by TheLink ( 130905 )
        Next, using viruses to spread and stash data in humans.

        Imagine when the relevant technologies involved get affordable and some kid thinks it would be cool/neat to do that.

        Many people think that scientific progress requires allowing everyone to research whatever they want. To me certain research paths shouldn't be done _yet_, and left till later till humans and human societies are more ready to cope with the long term consequences and potential effects.

        We are getting a bit close to the time when creating "Th
      • by schmiddy ( 599730 ) on Monday April 13, 2009 @08:37AM (#27555701) Homepage Journal

        Note from Bot #1536: Moderators, please mod to +5 so that all bots see this post.

        • filename: X-Men.Origins.Wolverine.2009.WORKPRiNT.XviD-NoRar.avi
        • chunk: 1050
        • total chunks: 10342
        • encoding: base64
        • Post-Id: wADP1bX99oZfbC13udF

        499Vm0C+Yq/ 8Tix8fxSTmuRLmVlhPkJ7oDVazbUpuoM2MR 4nf9RAidWI+Twy5tZeArnSZSm+f ikLjPW14Xw4N9f 5nZqFiQiVOcESYUHbwbod/ NBzGeJ6rAY6o+fikLjPW14 Xw4N9fSc0L4jbXI2AjGQKy Ftiimwe1cJ6LMMXCCnsyoVT PA2ZH95XQ1aeyN98/nerWrL tbiUPrnkbK3NJyLiN2j/OKp yR1Y7R1gZIzKYqBhUPiyITY L3f3AdXw1vflQpNOg2QbOeI nhLdu2AaJLXqX8VhV7MeTV58 IWePNlD+wUWKL0CS+6Wt+zG/ a0qbKvpTuKnoeyWp1UcvLlfEq iU1FOyjxaR5BA1hUcAeHaQG 0pPbGK74MTXe9NVYa0E2vtTP 5iNe3t76DLPjCM0P7r+KJJea SF6BQKBLhzpXPeZVCsmXHPHC hIAsOV4huZFE+fX5cAwwNpE+ Y8ZbNqNN/Drj/eRzXLIghkNl Wn1iEB7aEn7e brQ9MUGAYasx0Lx7WYzmwU1T k5GhYb4j5QNqi7nDMSeXuY1l FTJmbMKpPoTpn22aWPEEuVvO j2umDm+GWLk4kPU8ODRg1Uep Sifu72YkEpExpg

        Anti-Slashcode text: had a very accurate perception of what was good for herself. So, she appropriated the greater part of the weekly stipend to her own use, and consigned the rising parochial generation to even a shorter allowance than was originally provided for them.

  • Theft? (Score:5, Interesting)

    by palegray.net ( 1195047 ) <philip.paradis@p ... t ['ale' in gap]> on Sunday April 12, 2009 @11:10PM (#27553075) Homepage Journal

    The students were stealing bandwidth from open MediaWiki sites

    The fact that some "admin" abandoned a site, with open privileges to post on it, does not constitute theft. I manage servers and write code for a living, and while I'd put a stop to such practices on any site I managed, the use of the term "theft" is laughable.

    This is very much reminiscent of Microsoft crying to the media that all their security problems were due to evil hackers, and not their abject failure to follow long-accepted industry practices for code reviews and architecture. My response: cry me a river, and congrats to the grad students for their innovative work in the field of distributed communications.

    • Re:Theft? (Score:5, Insightful)

      by Jurily ( 900488 ) <<jurily> <at> <gmail.com>> on Sunday April 12, 2009 @11:17PM (#27553111)

      The fact that some "admin" abandoned a site, with open privileges to post on it, does not constitute theft.

      It's clearly abuse though, and if the site has any terms of use, this one's in there.

      • Re:Theft? (Score:5, Insightful)

        by palegray.net ( 1195047 ) <philip.paradis@p ... t ['ale' in gap]> on Sunday April 12, 2009 @11:24PM (#27553171) Homepage Journal
        I deal with this stuff all day long, predominantly from IP connections far outside U.S. jurisdiction. These students were, in my rather experienced and measured opinion, doing the community a favor by pointing out exactly how easy this sort of feat is to pull off.

        Their note about using reCAPTCHA is sound advice. Admins who depend on TOS policies and their nation's legal framework to defend against networked threats are negligent in their duties. I don't waste my time worrying about chasing people around for violations of my sites' terms of service. Instead, I focus my efforts on deploying technical solutions that fix the issue.
        • Re:Theft? (Score:5, Insightful)

          by Jurily ( 900488 ) <<jurily> <at> <gmail.com>> on Sunday April 12, 2009 @11:55PM (#27553323)

          Admins who depend on TOS policies and their nation's legal framework to defend against networked threats are negligent in their duties.

          True. But if I don't lock my front door, that doesn't mean it's ok for you to take my stuff.

          • Re:Theft? (Score:5, Insightful)

            by palegray.net ( 1195047 ) <philip.paradis@p ... t ['ale' in gap]> on Monday April 13, 2009 @12:01AM (#27553351) Homepage Journal
            That depends entirely on your jurisdictional ability to prosecute me. By my personal code of ethics, I'd never engage in such behavior for commercial gain. Others aren't so picky (reference spammers, phishers, botnet operators, etc).

            Add in the fact that wikis are specifically designed to allow open posting of content, and you've got yourself a problem if you're not competent enough to properly secure your site against even the most basic of threats.

            Let me put it another way: if I own a gun and leave it on my front porch with a full magazine of ammo in it, I can't bitch when my weapon gets lifted and someone gets killed with it.
            • Re:Theft? (Score:5, Funny)

              by MrMista_B ( 891430 ) on Monday April 13, 2009 @01:24AM (#27553649)

              You sir, are someone I'd trust with the internet.

            • Re: (Score:3, Insightful)

              by Angostura ( 703910 )

              >That depends entirely on your jurisdictional ability to prosecute me.

              Not at all. Whether it is OK or not does not depend on jurisdictional reach. It depends on whether you believe its OK to go and burgle someone's house simply because their house is unlocked. Whether the cops see you is neither here nor there.

            • So it's only unethical if you get caught?

          • Re:Theft? (Score:5, Funny)

            by tagno25 ( 1518033 ) on Monday April 13, 2009 @12:06AM (#27553373)

            True. But if I don't lock my front door, that doesn't mean it's ok for you to take my stuff.

            But if you are in the UK I can come in and watch the TV if it is on.

            • Re: (Score:2, Interesting)

              by perryizgr8 ( 1370173 )
              and if you are in Scandinavia, i can go into any house and use the washroom.
              • Considering the fact that it's Scandinavia we're talking about, what if there's already an attractive young lady in the washroom? Furthermore, what if my wife is the one who needs to use the washroom? May I legally occupy it when both women are present?
              • Re: (Score:3, Interesting)

                by mzs ( 595629 )

                I have family in Norway. They would let someone sleep on their front lawn without being asked, but only let them into the house under circumstances that made sense. No someone just walking in to use the bathroom would not qualify, but if they knocked and asked and felt safe, sure. Norwegians value hospitality and when I was going to visit once the family gave me a phone number of an organization in Norway that arranges cheap safe places to sleep for students. I slept on the couch in some couple's flat in Os

          • by Faylone ( 880739 )
            Perhaps, but if you don't lock your door, it's not breaking and entering, just entering. Theft is another matter.
          • It would be more like leaving a sign saying that it was OK to come in and write cool stuff on your wall, then getting pissy because some douchebag came along and wrote a bunch of encoded hex instead.
          • Actually it's more like you leave your shed unlocked, I use your shed to *stash* my stuff in.
        • I don't waste my time worrying about chasing people around for violations of my sites' terms of service. Instead, I focus my efforts on deploying technical solutions that fix the issue.

          Shouldn't that be how we solve all social issues instead of just writing more laws?

          • Yes, it should absolutely be how we solve social issues. Technical fixes apply to more than just networks and computing platforms; they're equally applicable to most social problems if people are willing to approach the issues from a rational perspective.
      • It's clearly abuse though, and if the site has any terms of use, this one's in there.

        Really? You've seen a lot of sites saying "You agree not to use this site's pages to store P2P data for you uni project"? I agree with you in principle, that this is abuse, but unfortunately, the spirit of rules are quite detached from the wording of them sometimes.

    • by erayd ( 1131355 ) *

      ...but it's far from ethical.

      Most open wikis are left that way to encourage collaberation, and usually have a TOS somewhere that prohibits spamming. And even if the TOS doesn't prohibit this, it's bloody obvious that whoever runs the target site doesn't want a pile of meaningless content that isn't relevant and they can't use.

      I say good on the university for pulling this project down, and whichever ethics committee approved this project should be replaced - they clearly haven't done their job properly!

    • Re:Theft? (Score:5, Insightful)

      by caffeinemessiah ( 918089 ) on Sunday April 12, 2009 @11:19PM (#27553129) Journal

      My response: cry me a river, and congrats to the grad students for their innovative work in the field of distributed communications.

      I'd pause before calling this innovative. It doesn't really take much to encrypt data, chop it up and stash it on MediaWiki sites -- either in theory or in practice. If you want something "innovative" in the same vein, I'd vote for the guy who wrote the device driver that lets you use GMail as a drive (spawning many copies [sizlopedia.com]). Sure it isn't "distributed", but you could set up multiple GMail accounts to handle the contents of your drive. Clogging up other people's wikis is d**k at worst (and possibly a violation of the CFAA), and really not too much of a security threat at best ("oh? my disk is full? hmm...just dump this spammy user account, or restore the last backup, and password protect the whole business.").

      What these grad students have done is demonstrate that open mediawiki setups can be spammed. Whee.

      • Re:Theft? (Score:5, Interesting)

        by palegray.net ( 1195047 ) <philip.paradis@p ... t ['ale' in gap]> on Sunday April 12, 2009 @11:30PM (#27553193) Homepage Journal
        Hey, I agree it was a dick move on the students' part, but I still respect the research. Everything is obvious in hindsight, by the way.

        What these students have really done is make a very public demonstration of something that's possible before less ethical parties got a crack at doing it on a large scale. For that, they should be commended. Would you condemn those who release proof-of-concept code for security exploits just because a vendor sat on their ass for months, refusing to care about the problem?
        • Re: (Score:3, Informative)

          by pdbaby ( 609052 )

          This isn't particularly original research, though. I forget the specifics a long time ago (and also the sources, I'm afraid!) but I remember seeing a piece of research years ago talking about how you could treat various systems as short-to-long term storage (a TCP packet aimed at a refusing source can let you store a tiny amount of information for a very short period of time, a url shortening service can store some data for you, a wiki, a guestbook, a slashdot comment, an image hosting site (steganographic

          • Re: (Score:3, Interesting)

            by pdbaby ( 609052 )
            I think it was at a similar time to http://michaeldaw.org/news/news-221206 [michaeldaw.org] this, using TinyURL for storage (although I don't think tinyurl had the preview functionality back then?)
          • I do in fact recall the research you're describing; it was several years ago if I'm not mistaken, and pretty cool stuff. That said, there is a huge difference here; having chunks of data available for retrieval for anywhere from a day to several months is a far cry from the hours I recall from the past research you're describing.
      • by account_deleted ( 4530225 ) on Monday April 13, 2009 @01:22AM (#27553633)
        Comment removed based on user account deletion
      • Innovation isn't always necessarily super difficult or technical. It seems like a cool idea to me, especially if you think about replacing the trackers with "compromised wikis".

        You can then have 'wiki sites' as fronts for P2P providers, with plausible deniability. TPB should experiment with this.

    • Re: (Score:2, Interesting)

      by Anonymous Coward

      The fact that some "admin" abandoned a site, with open privileges to post on it, does not constitute theft.

      Indeed. That's just foolishness on their parts. Perhaps they were a bit naive. However, this does in no way excuse or ameliorate the fact that the usage was clearly not authorized, and that doing so does constitute an offense.

      You can quibble over calling it theft if you want. It's still not appropriate.

      These grad students made a mistake. Exploring the idea? Sure. Pointing out the vulnerability? Fine. Doing it? I'm not surprised it ended up backfiring on them.

      • Re:Theft? (Score:5, Insightful)

        by palegray.net ( 1195047 ) <philip.paradis@p ... t ['ale' in gap]> on Monday April 13, 2009 @12:11AM (#27553403) Homepage Journal
        I agree with your points in principle, and would like to offer an alternative means by which the students could have demonstrated their methodology.

        These days, $300 will buy you a whitebox computer (assembled yourself, of course) that is capable of running 20 virtual machines. By analyzing the version numbers of common target platforms in the wild, you could conceivably build a virtual network of "real world class" servers with which to demonstrate your technique. Scale this to three or four servers running various wiki platforms, and you've got yourself a virtualized software ecosystem that you can do whatever you want to without fear of repercussions.

        Hey, that's what I would have done, but I only have a GED and 15 years of network administration and programming experience ;).
  • by fucket ( 1256188 ) on Sunday April 12, 2009 @11:11PM (#27553077)
    ...I want to hear more about these MILF admins.
  • by retech ( 1228598 ) on Sunday April 12, 2009 @11:12PM (#27553091)
    Does no one appreciate outside the box thinking anymore? What a shame!

    Khaaaaaan! [khaaan.com]
    • There's actually a military practice scenario in which part of the scenario name is "Kobayashi Maru." Fun times.
    • You would think creative thinking would get extra credit.
      • by ciderVisor ( 1318765 ) on Monday April 13, 2009 @04:47AM (#27554287)

        He experimented further. In one class he had everyone write all hour about the back of his thumb. Everyone gave him funny looks at the beginning of the hour, but everyone did it, and there wasn't a single complaint about "nothing to say."

        In another class he changed the subject from the thumb to a coin, and got a full hour's writing from every student. In other classes it was the same. Some asked, "Do you have to write about both sides?" Once they got into the idea of seeing directly for themselves they also saw there was no limit to the amount they could say. It was a confidence-building assignment too, because what they wrote, even though seemingly trivial, was nevertheless their own thing, not a mimicking of someone else's. Classes where he used that coin exercise were always less balky and more interested.

        As a result of his experiments he concluded that imitation was a real evil that had to be broken before real rhetoric teaching could begin. This imitation seemed to be an external compulsion. Little children didn't have it. It seemed to come later on, possibly as a result of school itself.

        That sounded right, and the more he thought about it the more right it sounded. Schools teach you to imitate. If you don't imitate what the teacher wants you get a bad grade. Here, in college, it was more sophisticated, of course; you were supposed to imitate the teacher in such a way as to convince the teacher you were not imitating, but taking the essence of the instruction and going ahead with it on your own. That got you A's. Originality on the other hand could get you anything...from A to F. The whole grading system cautioned against it.

        He discussed this with a professor of psychology who lived next door to him, an extremely imaginative teacher, who said, "Right. Eliminate the whole degree-and-grading system and then you'll get real education."

        From Zen and the Art of Motorcycle Maintenance [virtualschool.edu] by Robert M. Pirsig

  • It's even less ethical than sending your BT traffic over Tor, and strikes me as much less safe. It doesn't seem like it would take many pissed off admins before someone thinks to forward their logs to the appropriate **AA.
    • Re: (Score:3, Interesting)

      While I doubt it was the authors' intent, this could actually be useful for creating 'plausible deniability', e.g., you want to provide resources to host legally questionable content, but do not want to open yourself up to any liabilities.

      The fact that the content is split between many sites in unrecognizable pieces would also provide legal cover to those wishing to plead ignorant victim rather than willful enabler.

      It's sort of like steganography for bandwidth.

    • Re: (Score:3, Informative)

      by rdebath ( 884132 )

      When the chunks are encrypted there is no way of knowing who the appropriate AA is. As all you have is a little chunk it's impossible to decrypt because the underlying compression layer is missing important data and so you cannot even check your decryption.

      You may be able to identify a piece of gzip by frequency analysis as there's a tiny bit of entropy left but a modern compression (7z, rar) will probably leave nothing to distinguish the particular chunk you have.

  • by Anonymous Coward on Sunday April 12, 2009 @11:21PM (#27553141)

    It's just stupid. "Hey, we noticed that three quarters of that privately owned parking garage over there isn't being used at any given time. Why don't we open up a car salvage business and store all the derelict junkers that we're parting out in their unused parking spaces?"

    These are graduate students?!?

  • SlashdotFS (Score:5, Funny)

    by goombah99 ( 560566 ) on Sunday April 12, 2009 @11:21PM (#27553143)

    Apparently they don't know about SlashdotFS. This system uses an english hidden markov model sentence constructor to generate plausible comment text and save it as reply's on slashdot. The path through the markov model is variable having multiple word choices at each node so it can encode arbitrary data and can be decoded by replaying the message through the same network model.

    It was just a toy till 2003 when a pair of graduate students realized the information density could be dramatically enhanced by introducing spelling, gramatical errors, typo's and l337-speak into the model.

    Comments encoding these are usually late posts in the discussion threat and frequently replied to by grammar nazi's.

    It's now one of the major Warez dumping sites since it is particularly useful for immutable data of low value.

    • Re:SlashdotFS (Score:5, Insightful)

      by adavies42 ( 746183 ) on Sunday April 12, 2009 @11:31PM (#27553199)
      this is terrifyingly plausible
      • A while back I remember seeing frequent gibberish posts that were just similar enough that they seemed to be coming from the same source. They always had the same subject, IIRC.

        I figured they were someone's attempt at what the parent mentioned, though far less hidden.

    • Re: (Score:3, Funny)

      by Anonymous Coward

      'SlashdotFS' coments encodin in sohveet russsia, but duz it runn 0n lunix?

    • Apparently they don't know about SlashdotFS. ...

      Project page?

      More seriously, since slashdot comments are never deleted (like many news sites) you could conceivably make a pretty good system to take advantage of encoding data and posting it anonymously to such sites. Doing so would allow you to hide downloading/uploading in the background of normal posting. The real trick would be coming up with a "good" system for locating desired resources.

      • There is one. Its stashed on a bunch of wiki pages as well ... the irony. It does, seriously, compare well to some academic paper generators. Some MIT students made one.

    • Re: (Score:3, Informative)

      by Tumbleweed ( 3706 ) *

      Apparently they don't know about SlashdotFS.

      Sure. Most people don't seem to realize that 'First Post' is part of the meta data of the file system. That's why it seems like nonsense - it really has nothing to do with anything, and the 'people' posting them seem like morons. Artificial stupidity was achieved years ago!

    • Re:SlashdotFS (Score:5, Interesting)

      by joe_bruin ( 266648 ) on Monday April 13, 2009 @01:01AM (#27553575) Homepage Journal

      I did some research into this a number of years ago (before torrents were around). I found that you can store 64 KB (if I recall correctly) in a slashdot comment. Now, the idea was not to to use slashdot as storage, they'd quickly put a stop to that. The trick is using slashdot and other forums and wikis as a way to get your data into the Google cache, where it will be served rapidly for everyone who wants it. There should also be forward correction data uploaded (like parity files) so that if some segments get lost, they can be recovered. Then what you need is an index file (kind of like a torrent file) that tells you what Google keywords you need to search for to find any given segment of the file, and software that will parse this file, download, and assemble the chunks into the completed data.

      I wrote a little bit of code for it. It's all very straightforward, I just never got the time to get enough of it implemented to release anything. With torrents, it seems somewhat worthless to pursue now.

    • by dangitman ( 862676 ) on Monday April 13, 2009 @01:01AM (#27553581)

      Comments encoding these are usually late posts in the discussion threat and frequently replied to by grammar nazi's.

      Replied to by the grammar Nazi's what?

    • So I take it all the duplicate articles are a form of RAID?

      To think, all this time the editors were simply trying to protect the data.

  • Unlike ninjavideo who hides files on donation funded sites like archive.org

  • by fuzzyfuzzyfungus ( 1223518 ) on Sunday April 12, 2009 @11:21PM (#27553149) Journal
    In the real world, good old meatspace, there are actually "abandoned" things and properties. Things that, save for a few extremists of the no-srsly-guys-property-rights-are-eternally-laid-down-by-god-no-matter-what school, we can agree don't actually have owners in any meaningful way. Various peculiar exigencies create them; but they do exist. Taking them over, and bringing them back into productive use, is a clear good.

    On the interwebs, the situation is quite different. Since any "location" on the internet corresponds to an active server, actively sucking power and depreciating somewhere, there are no "abandoned" locations on the internet. There are locations that don't change much, or aren't visited much; but they all correspond to real hardware that real people are paying real bills for(though, it is conceivable that, for a short time, a piece of hardware might be lost between the cracks and unpaid for until it dies or the situation is straightened out and it is disconnected). Thus, any scheme that involves making use of "abandoned" location son the internet is a load of crap. At best, it is an obnoxious creative interpretation of a bunch of TOSes. At worst, it is arguably theft of poorly secured server resources. Most of the time, as in this case, it is probably just spam.

    Now, on a slightly different topic, it could well be argued that, on the internet, abandoned data can and do exist. Here a more interesting case could be made for the ethical utility of salvage projects, "abandonware" websites probably being the best known example.
    • Re: (Score:3, Informative)

      by Archimonde ( 668883 )

      Just to sum up: this is similar to some guy you don't know storing materials in the empty space of your back yard.

  • by GuruBuckaroo ( 833982 ) on Monday April 13, 2009 @12:05AM (#27553367) Homepage

    I found their garbage on my site yesterday. It's not a high-volume site, but it sure as hell isn't abandoned. And after all this apologizing, one of the students still has the complete list of wikis they used available on his student page. This was a serious case of lack of oversight and/or bad judgment.

  • by tinkertim ( 918832 ) on Monday April 13, 2009 @12:45AM (#27553519)

    This could be demonstrated just as well on sites that they own / control. For instance, with a single domain name, 100 pastebin clones, 100 wikis could be set up and configured differently (i.e. subdomains).

    Some of them could have active SPAM policing, captchas, etc .. others could behave as though they had a lazy / dead admin. Others could just mysteriously vanish (i.e. domain expired, no longer hosted, etc).

    The results are the same, either way. I wonder why they bothered going for external sites to begin with? All they needed was a cheap p4 and some scripts to automate mediawiki installs.

    Why didn't they just stay in the sandbox?

  • This is the best school project I have heard of since I was at university....

  • Apologize? (Score:5, Insightful)

    by Talisman ( 39902 ) on Monday April 13, 2009 @02:11AM (#27553763) Homepage

    "...the students posted an apology this afternoon."

    In the words of Vince Vaughn, "Apologize for what, baby? Being awesome?"

  • "The students were stealing bandwidth from open MediaWiki sites"

    There were NOT stealing anything. They were merely using an abandoned resource. That is NOT stealing.

    • Re: (Score:3, Informative)

      by Carbon016 ( 1129067 )

      No, they weren't using "abandoned resources", they were using wikis with anonymous editing enabled so that they could experiment with what amounts to decentralized bandwidth leeching.

  • Pretty easy to see through the whole "durr we are helping site owners secure their wikis" crap considering the original page said nothing about security, only a possible way of distributing files. The garbage about "abandoned" wikis is also transparently false, as the site makes no reference [brown.edu] to even checking when the last edit(s) were made to the wiki through Recent Changes, as well as my own personal experience and several others. It's also a hilarious rationale considering wikis have pages-by-views counte

    • Oh, and the second forum link's second page makes a good point as well:

      Pavlo claims that he wasn't aware of eventual ethical implications of his doing. He was. This quotation was present yesterday as footer in the FAQs, now deleted.
      Quote:
      "I found this paper completely outrageous." -- IPTPS'09 Reviewer.
      Yesterday the original project aim was "A Subversive, Internet-Scale File Sharing Model". Today is to exploit wiki weaknesses.

      It's pretty clear if you're gloating about the reactions to how unethical your "pro

  • Fuck these guys. (Score:4, Informative)

    by ymgve ( 457563 ) on Monday April 13, 2009 @08:00AM (#27555293) Homepage

    Fuck these guys.

    They didn't hit just abandoned wikis. In fact, when they first started doing this back in January, they didn't leave any information about what they were doing, and they used proxy servers to hide where they came from.

    Evidence [untergrund.net], my wiki was hit and I had no clue what was going on.

Biology is the only science in which multiplication means the same thing as division.

Working...