Wired on Kipling 151
The Dodger writes
"The Kipling 'Hacker' luggage debacle gets coverage in
Wired, along
with slightly derogatory references to the Slashdotters'
ability (or rather lack of it) to 'crack the site'... "
Strange. Someone sent me the winning login & password (way
to go MoobY!).
I vow to never pay for this kipling crap though. Terrible
article though: its one thing to confuse hacker &
cracker, its completely different to be cocky about your
misuse. It seems quite apparent that we aren't the
target audience. What I would like to know, is who is?
We're trendy now guys. We still don't get to marry supermodels
tho...
Kipling rules the waves (Score:1)
It's pretty nice though to be popular, even if it is with a stupid bag-manufacturer.
Why not unleash a slashdot-efect at ten times the strength on that server. That should at least knock 'm out of buisiness
Bye all
Too 'leet for me... (Score:1)
Gee, I can't be a cool hacker without one of these steenkin' bags... Let me get my supermodel girlfriend to buy me one so I look cool to all my hacker buddies when I pull up in my Mercedes at the tennis court... Yeah. Like anybody who's a true hacker (and believe me, I sure as hell ain't got the skills to be one) would ever be dumb enough to advertise themselves with one of these bags... Then again, it would be funnier than hell if they got their site
i'd rather marry a sweet female hacker (Score:1)
Well thats a refreshing viewpoint. Wish it were the norm.
Pagans != Satan worshippers. (Score:1)
And before you ask, no, I'm not either one. I'm just an outside observer to the whole religion thing (agnostic/atheist) and find the mislabelling rather disgusting, like mislabelling hackers.
Let me get this straight here... (Score:1)
Like hell (Score:1)
this is starting to make sense. (Score:1)
Marrying a supermodel? Ummmm, no. (Score:1)
-lee...I was dreamin' when I wrote this...
Ahh ok (Score:1)
The stats are not "off" (Score:1)
Whether you LIKE it or not
Maybe my sig is a commentary on MS's monopolistic power even over those who would worship another OS
Either way, the stats are correct.
Was I talking to you? (Score:1)
And was I replying to YOU? No I was not, I was replying to the person who said my stats were "off" yet they had to use Windows at work.
72% of linux community is made up of "push overs"? (Score:1)
So the 72% of
The stats are a big trout (Score:1)
Marrying a supermodel? Ummmm, For a WEEKEND yeah ! (Score:1)
You'd be surprised how the MOST BEAUTIFUL women are also the MOST LONELIEST . . .
All beautiful people are not dumb, and not all smart people are ugly . .
I met a gorgeous, beautiful FREAKING INTELLIGENT woman one time and we got along sooo great I was falling for her but still in the back of my mind i was thinking (uh, she's gorgeous = Bimbo) and she wasn't . . . she was very smart . . .
But she was a PAGAN/SATAN worshipper so that sucked !
heheh . . . anyways . . don't be to early to judge
les thy be judged.
or something like that . . .
Typical bloody mary . . . extra tabasco (Score:1)
chill . . .
*Singing*
"WAR ! . . *HUH* . .
What it is it good for,
absoluetly nothing say it again . . War .
(repeat)
What's he trying to sell and to whom? (Score:1)
countered Larry Lein, executive vice
president of Kipling USA. "If you asked me
what a cracker was, I'd say someone who
lived in a trailer park down South."
What a mrketing wizzard. He might have better luck selling burlap bags to the trailer park set.
55% use Windows...... (Score:1)
that's why I think the stats are off
ChiefArcher
Free Bag (Score:1)
"We still don't get to marry supermodels" (Score:1)
'41PPL1nG'? (Score:1)
Slashdot comments now quoteables? (Score:1)
He also e-mailed me with the final quote.
So yes, i knew i was being quotes as such
Free Bag (Score:1)
Free Bag (Score:1)
Here's the URL:
http://www.kipling.com/hacker/game/login.html
Sex with supermodels? Ummmm, no. (Score:1)
If there's one thing supermodel partners are qualified for. it is as status symbols. Ultra-wealthy men don't have young model-grade trophy wives because they are better lovers or better domestic partners; they have them as status symbols, to parade around and demonstrate their worth. It's like buying a pedigree cat for $1000; other than status you don't get much in the way of features.
Is this a trick question? (Score:1)
Besides, if she's a stick-thin, sickly anorexic, chances are she's not going to be much of a performer in bed...
41PPL1nG R00Lz (Score:1)
I visited the site and looked around. I found the technical information on it to be pretty accurate, considering it was part of a marketting campaign for a luggage company. I saw the term "cracker" used correctly in one place .
Furthermoe, this VP is correct: "hacker" is in common use when "cracker" is the correct term. Words often change their meaning over time as they are used in varying ways. I guess a community of people who rarely have face-to-face conversations might find this feature of language surprising.
I thought the campaign was a bit patronizing and aimed at wannabees and newbies. Of course, "hacker" lost any meaning for me the first time I heard someone claim to be a hacker when they'd never programmed in assembler. As if.
If you're really offended by Kippling's campaign, maybe you should go out and stage a protest. Oops, I suggested going out. Never mind. Go back to arguing over emacs and vi in IRC.
'41PPL1nG'? (Score:1)
Drugs.
id="www.kipling.com/" (Score:1)
pword must "cock" or "crap" or "fist" or something...
; )
Kipling Damage Control, reporting for duty! (Score:1)
"A hacker is a malicious computerexpert who breaks the security of computersystems not to steal or destroy sensitive information but mostly just for the kick."
Note the contrast between "not to steal or destroy" and "malicious". And what's up with the "computerexpert" double-speak? Double plus ungood.
Keith Russell
The site's not in the US (Score:1)
The URL (Score:1)
Typical bloody Yanks... :) (Score:1)
What is "lpd_value_2" ? (Score:1)
1) How is it known that lpd_value_1 will be
"http://www.kipling.com/hacker/game/login.html" after the decryption ?
2) Does anybody know what will be the value of lpd_value_2 after the decryption ?
Slashdot comments now quoteables? (Score:2)
64bit crap (Score:1)
someone should look into that.
Kipling slashdoted? (Score:1)
someone post the username and password here so we can all get free crappy bags, and put them out of buisness.
the Spam bag... (Score:1)
The
[kipling.com]
Spam bag...
It's just so damn goofy! Can you imagine walking into Systems of a Fortune 400 with Hacker on your bag? In NewsTrolls I said I was frustrated and came close to buying the cyberpunk bag b/c it was a flat backpack that could hold a laptop...AND opera scores...however, this weekend I found a great laptop/scores bag with dual zippers at the mens' Banana Republic....well that's pretty yuppie too, but at least it doesn't have any goofy names on it...just simple black nylon and exceptionally good padding for the shoulders. 'Course I put a NewsTrolls sticker on it...
I guess the "Georgia Crackers" all moved North. (Score:1)
"We still don't get to marry supermodels" (Score:1)
Try getting some exercise and sunshine now and then.
bag quality (Score:1)
It's a hell of a lot better than a Targus bag, anyway
-s
Codebreaking and the Wired article... (Score:1)
OK, I don't know MoobY, and I can't comment on his cryptographic skills. So I don't know how he obtained the password. However, there's things the article misses:
The "traditional hacker" manner for breaking such a site has nothing to do with decyphering the mathematical algorythm. It would be to attack the web server, gain root, and read the internal database. Not that difficult for a good chunk of script-kiddies (or some of us old fogies, too. (bad! Erik. Don't do that anymore!) (Really.)) However, this isn't even remotely intellectually challenging. So, if all we were interested in was Kipling crap (which we obviously weren't), there would have been as mass attack against the site. There wasn't. (Unless you count the /. effect. :-)
Instead, there was alot of debate about the mathematical underpinnings of the code. I think this is the best illustrated distinction between cracker/hacker that has come out recently: what the obvious goal was the glory for the intellectual accomplishment of cryptoanalyzing the cypher NOT just getting the answer.
Of course, I wasn't surprised that no-one here seems to have broken the code. Cryptoanalyzing stuff is very hard, and requires very specialized education. I've had alot of it, and would consider myself (at best) a poor amateur. I'm going to hazzard a guess and say that less than 10% of /. readers have sufficient crypto education and experience to do a good job of even analyzing the algorythm. And how many of us can honestly say we understand more than half of the math in Applied Cryptography. I can't.
Anyway, until someone posts a good analysis of the code, here's what about 14 hours of frustration have produced about it:
The main "crypto" routine is simple XOR, which is easily reducable (and cryptoanalyzable). The problem is in key generation/setup. The key generation appears to be a trap-door one-way function used as a hash. I've tried most of the ones I can find (ie, all from App Crypto, some from sci.crypt.moderated archives, and some from elsewhere), and can't find any match. The hashing function exhibits a good avalanche effect, but apparently has collision problems. The length of the keyspace is less than the obvious, but still large enough to resist brute-force search. Also, the use of JavaScript is problematic, since it's slow and not really easily portable to C without some substantial effort (anyone have a % operator for floats that mimic's JavaScript's ?)
I wrote a recursive intelligent brute-force search, but it still requires way to much resources and time to run (it's far from memory efficient). Basically, what you do is this:
Given that you know the "cyphertext" characters (http:// ... ), you can work backwards to determine that the first possible character of the login is about 4 choices. So, for each of them, you make a tree. It turns out that at each node, there are about 4-6 possible leafs that continue to give the correct URL. Eventually, each leaf runs into a problem where no possible characters result in the correct cyphertext - thus, you trim that branch. (or you've managed to find a solution.) Rather than about 73^20 (about 2^123) possibilities, the algorithm above runs about 2^40 possibilities. However, it has exponential memory requirements. Even I don't have that kind of memory on this box. :-)
Hopefully, someone will point out mistakes in my analysis, and we might eventually get a full disection of the algorithm. I'm not interested in the login/password, I want to know what the trapdoor is...
-Erik
I just want to have sex with supermodels.. (Score:1)
Three years ago, I was a hacker-DJ, living an almost completely nocturnal lifestyle, DJ'ing in nightclubs and spending most of the remainder of my waking hours sat in front of a computer.
These days, I do scary things like wearing suits and legitimately logging in as root on computers which cost more than a four-bedroomed house in a posh are of north London.
Quite a few of my former partners in crime are doing a similar sort of thing. some of us have even come close to setting up our own security consultancy.
"Information wants to be Free" - the cry of the new Cyber Socialists!
Dodger
Typical bloody Yanks... :) (Score:1)
The Brits were breaking encryption before the Yanks knew what a computer was!
D.
Typical bloody Yanks... :) (Score:1)
And please don't refer to me as a Brit.
D.
Typical bloody Brits... :) (Score:1)
Wanna know why?
Because I'm not British!
So, if YOU don't want to be counting the fingers you haven't GOT, I suggest you stop calling me a Brit!
Why does an Irishman wear two condoms?
2BSure, 2BSure...
D.
The real target (Score:2)
How about "System-Breaker"? (Score:1)
How about "System-Breaker"? That nicely describes what these people are, is probably catchy enough for the media, and doesn't step on the toes of old-guard hackers or sound silly.
Just my 2 cents / 1.3 cents US.
Nomenclature musings (Score:1)
OTOH, I can see three problems with trying to revive "worm" in this sense. It already has an established meaning in computing jargon, so adding another could lead to confusion. It didn't stick the first time. And it sounds perhaps a bit too perjorative for use except specifically as an insult.
IMO, this probably wouldn't stick this time either, partly because it is perjorative. The trick is finding a name that these people wouldn't mind calling _themselves_, which IMO is one of the reasons that "hacker" caught on. "System-breaker" has a chance, though that would probably be abbreviated and mutated among the WaReZ d00dz crowd that it's aimed at. Other labels that have a chance undoubtedly also exist.
And how about "maggot" as the emphatic form?
IMO not a good idea, as it's too close to "faggot" (a perjorative term for homosexuals, for readers who aren't in North America).
Other suggestions from our copious lurkers?
Free Bag (Score:1)
I dislike the names they gave the bags, but a free piece of luggage is a free piece of luggage, how can i turn that down?
Now THAT sounds like a gauntlet hitting the floor! (Score:1)
Well, just how 'secure' is wired??
Now that they cater to MBA wannabe twerps, instead of people who understand (or at least want to) the technology..
I, for one, would LOVE to see the WIRED site on the 2600 'recently hacked' milk carton.
Oh this is crap though!!! (Score:1)
Pirates
pirates are warez kiddies.. they don't
hold a stick to HACKERS or CRACKERS
and much less good / experienced
ones... *SIGH* these corporations
are not gonna sell anyone on
a bag called DOWNLOAD or SPAM...
<CITE>ARE THEY?</CITE>
the key the key (Score:1)
PI and modulus (Score:1)
Nice sour grapes rationalization (Score:1)
Sounds like revisionism to me. At the time, there were plenty of posters telling us how easy it would be for mighty Slashdotters to crack the code, but now after failing to do that, we hear "Aww shucks, nobody was really tryin'."
Puh-leeease. Damn fools talkin' the talk but they can't walk the walk. Oh yeah, and there's nothing at all wrong with the way that they're using the word "hacker." Give it up already.
Cheers,
ZicoKnows
How about "Hacker"? (Score:1)
That, combined with a lot of clueless people around here learning what "context" means. It's really not that hard, folks, and you'll find yourselves much less stressed out.
Cheers,
ZicoKnows@hotmail.com
What's he trying to sell and to whom? (Score:1)
How much you want to bet that the judge doesn't laugh them out of the courtroom?
Marrying a supermodel? Ummmm, no. (Score:1)
In my personal experience, the one whole supermodel that I met in real life was nice enough and didn't come across as a bimbo. How many have you met? Or are you just being a prejudiced bigot who stereotypes people they've never met? Mmm...watch our for those sour grapes.
www.kipling.com hacked? (Score:1)
I'm guessing a bunch of people got the correct username and password and claimed all bags, so Kipling is redoing their site to reflect this. Or maybe they're experiencing the
Now I'm sad. I wanted to get a sup3r-k3wl newbie bag.
-sk
Typical bloody Yanks... :) (Score:1)
Wired's target audience... (Score:1)
My own little paranoid theory (Score:1)
Peace,
--
Kaufmann
Maybe I should go to that store... (Score:1)
But then again, where's the sport in that ?
Aside from that, I have owned and used a Kipling bag for years now, and I'm very satisfied with it. Regardless of their clueless marketing, I think they make good bags (although I had to remove the little monkey doll that was attached to the bag as a marketing stunt when I bought it).
Illegal to export ?? (Score:1)
Been there, done that (Score:1)
By an amazing coincidence I also happened to work at planetinternet.be not long ago. I'll see if some of my old buddies there know anything
Not all encrytion has to be "exported" (Score:1)
64 BYTE crap? (Score:1)
-Shrub
thats cute (Score:1)
Someone should also tell him that crackers and hackers are emphatically not the same.
Mike
--
I guess the "Georgia Crackers" all moved North. (Score:1)
Mike
--
Marrying a supermodel? Ummmm, YES (Score:1)
But to be perfectly honest, I can think of worse things than having to come home to a supermodel every night. Then proceeding to have sex with them would make the whole deal even better.
All in all, I think it might be worth it. =)
Dont comment until you've actually read the code (Score:1)
Slashdot bag affect (Score:1)
WE'RE FAMOUS!!!! (Score:1)
Do you think that, now that I'm the famous "Beef from Slashdot and Segfault," they'll make an action figure out of me?
55% use Windows...... (Score:1)
I vote we FRAG this commander.
like there are ANY left... (Score:1)
Pagans != Satan worshippers. (Score:1)
i don't know what satanists do, per se, but they are NOT on the same plane of existance that the rest of us are.
What's he trying to sell and to whom? (Score:1)
Actually, tho, "cracker" has always meant, to me, something like a really stupid klan member.
it's just a marketing ploy... (Score:3)
It's a load of bollocks designed to sway some percentage of the brainless masses to make a buck -- I don't see why people are so worked up about this. If Kipling made better bags I might even get one but their designs are lame Kiplinged versions (dumbass visible zippers, poor worksmanship, cheap materials and a stupid logo) of bags designed by other companies. Their version of Manhattan Portage's J-Pack is the worst -- I beleive they call it the "firewall". I wonder if I jacked in through it if it would keep the bad people out. I think the best part is the giant rubber block-print "HACKER" label stitched to each bag.
See it as another failed attempt at success from a company with no sense of style and pity them.
/. and this line of bags (Score:1)
kmj
username+password (Score:1)
thats cute (Score:1)
validation (Score:1)
if only i had one of those bags, then i could truly consider myself a hacker.
You don't want to marry supermodels, ... (Score:1)
But really, Wired's target audience noticeably changed from 2-3 years ago. It used to be geeks/hackers/programmers/etc. Now they are heavily oriented towards the Silicon Valley start-up crowd. The key terms now are stock options, media attention, buzz and fluff.
No objections (Score:1)
Yes, I know that geeks of yesteryear are enterpreneurs of today. But not all of them made the switch, plus there is a new generation growing up. I understand why Wired's target audience is changing, but I don't have to like it.
64bit crap (Score:1)
comments?
Here, here! (Score:1)
I don't wanna be trendy! Remember when being a 'hacker' meant something about knowledge, too?
How about reviving "worm"? (Score:1)
OTOH, I can see three problems with trying to revive "worm" in this sense. It already has an established meaning in computing jargon, so adding another could lead to confusion. It didn't stick the first time. And it sounds perhaps a bit too perjorative for use except specifically as an insult. But even if "worm" doesn't take the place of "cracker" or stop the misuse of "hacker", I reckon it could complement them nicely.
And how about "maggot" as the emphatic form?
Nomenclature musings (Score:1)
Heck, let your hair down. What kind of seriousness do you expect to find in the lower reaches of a Slashdot thread? Here be dragons. :)
*sigh* True: "worm" is too strong to substitute for "cracker" or "hacker". As an insult, though, I reckon it deserves to go far. (In all modesty. :) ) Unfortunately, "System-breaker" sounds, I think, too plodding and too explanatory to catch on either (as well as not being precise enough: "cracker" usually implies a certain type of system-breaker, no?).
The other, loathsome, word is well known across the pond too. I hadn't noticed the similarity when I posted, but I'd still stand by my suggestion. It's certainly right to take pains to avoid giving unintentional offence, but I tend to draw the line at pandering to the type of person who can't or won't distinguish one common word of English from another.
How about "Hacker"? (Score:1)
"We still don't get to marry supermodels" (Score:1)
And if you continue to spend your Friday nights obsessing over the openness of the Qt license, that situation probably won't change anytime soon.
Pfffft! That's for Thursday night. Friday nights are for reading RFC's.
I don't think anyone really cared very much. (Score:1)
As for the people at Kipling:
Aside from being inaccurate since there's really no need to break their security at all to win the contest, they now confuse the definition of the term "pirate" too. "Pirate" is a term coined by the computer industry to demonize people who copy their software without permission. It's something completely different from either a hacker or a cracker. Sure, it's actually a better analogy for breaking security than it is for copying software, but to paraphrase Larry Lein, executive vice president of Kipling, USA "[pirate] is the term in common parlance".
Of course, Kiplings indifference to how real hackers define the term demonstrates who their real market is. They're not selling to real hackers, they're selling to B1FF, the kewl D00d or whatever. Their market is people who've seen movies like "the net" or "hackers" and think that that's what a hacker is.
Typical bloody Brits... :) (Score:1)
Oh, btw, leaking liquid nitrogen is fun, but leaking liquid hydrogen is more exciting!
Grandpa Spaz
Typical bloody whatever the hell you are... =) (Score:1)
G
YOU shouldn't comment until you've read the code (Score:1)
javascript doesn't have a uchar, and
the %256 is actually a floating-point modulus
operation in Javascript...
like fmod(x,256)... It's a bitch,
but that's how it is....
so every last bit of that PI value MUST be perfect.
My own little paranoid theory (Score:1)
Anyone eager to code that in C? (Score:1)
48 uniq only on first step.. (Score:1)
during the swap. If there are 48 uniq values
before the first swap, there may be 49 uniq values
after the second.
The lpd_code is modified by every swap...
So the number of possibilities is much higher.
What is "lpd_value_2" ? (Score:1)
This is a fake. (Score:1)
www.kipling.com hacked? (Score:1)
I think someone really got to them.
They pissed everyone off with that Wired
interview... they were asking for it...
Where can I buy the laptop bag? (Score:2)
-