1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

News Microsoft spills COFEE on your secrets

Discussion in 'Article Discussion' started by CardJoe, 30 Apr 2008.

  1. Nexxo

    Nexxo Queue Jumper

    Joined:
    23 Oct 2001
    Posts:
    33,700
    Likes Received:
    1,294
    Yeah, those yaks look tasty. :D

    But for every action is an equal and opposite reaction. MS creates COFEE, some hacker creates DECAFF (Data Evidence Collecting and Analysing Fiend F***er).
     
    Last edited: 30 Apr 2008
  2. Redbeaver

    Redbeaver The Other Red Meat

    Joined:
    15 Feb 2006
    Posts:
    2,057
    Likes Received:
    34
    i want one of those....... now to see if i can fake a police ID n get into their online forensic team........
     
  3. E.E.L. Ambiense

    E.E.L. Ambiense Acrylic Heretic

    Joined:
    26 Jul 2007
    Posts:
    2,957
    Likes Received:
    68
    :hehe: :lol:

    Good stuff! But it practically writes itself, right?
     
  4. Faulk_Wulf

    Faulk_Wulf Internet Addict

    Joined:
    28 Mar 2006
    Posts:
    402
    Likes Received:
    6
    No one with a clever "Hot Coffee" comment? :p

    (I have nothing to add that hasn't been said already. +1 on CS Lewis quote.)
     
  5. Buzzons

    Buzzons Active Member

    Joined:
    21 Jul 2005
    Posts:
    2,976
    Likes Received:
    20
    LiveCD = 100% data recovery from a linux or windows OS -- boot it in a vm while not powering down the real PC = same thing. This is just a script that will pull data out of set areas, for linux it would be the same as copying /home/user etc

    not a big deal at all.
     
  6. DXR_13KE

    DXR_13KE BananaModder

    Joined:
    14 Sep 2005
    Posts:
    9,120
    Likes Received:
    364
    i am thinking of a mix of encryption + virtual machines....
     
  7. speedfreek

    speedfreek New Member

    Joined:
    9 Nov 2005
    Posts:
    1,453
    Likes Received:
    1
    I wouldn't mind a copy of this. That way when I'm fixing peoples computers I can instantly get full access.

    I see this getting out there and widespread quickly, nothing but bad in my mind.
     
  8. GoodBytes

    GoodBytes How many wifi's does it have?

    Joined:
    20 Jan 2007
    Posts:
    12,300
    Likes Received:
    709
  9. Gareth Halfacree

    Gareth Halfacree WIIGII! Staff Administrator Super Moderator Moderator

    Joined:
    4 Dec 2007
    Posts:
    13,057
    Likes Received:
    2,153
    According to that post, it does exist (which it does - hence the picture of the Microsoft bod demonstrating it), but it can't bypass BitLocker encryption. Which the original article never claimed it could - it bypasses account passwords, not encryption.
     
  10. ch424

    ch424 Design Warrior

    Joined:
    26 May 2004
    Posts:
    3,112
    Likes Received:
    41
    There's quite a bit of over-reaction to this article. As already stated by Buzzons and Gareth Halfacree, you can get full access to windows user files just using any recent Linux live CD and this still doesn't break encryption.
     
  11. steveo_mcg

    steveo_mcg New Member

    Joined:
    26 May 2005
    Posts:
    5,841
    Likes Received:
    80
    Only difference i can see is that the live-cd would require a reboot, does this?
     
  12. ZERO <ibis>

    ZERO <ibis> Member

    Joined:
    22 Feb 2005
    Posts:
    454
    Likes Received:
    8
    I would like to see a hacker get his hand on one of these and see what he has to say about it's capabilities...
     
  13. Firehed

    Firehed Why not? I own a domain to match.

    Joined:
    15 Feb 2004
    Posts:
    12,574
    Likes Received:
    16
    Because "if you're not doing anything wrong then you've got nothing to hide" thinking is just what we need in today's society.

    Except that we have plenty of corrupt police officers.
    Except that this software WILL be leaked.
    Except that the leaked software WILL be used by crackers, malware writers, botnet admins, etc.

    Thurrott's article to which GoodBytes linked says that this article is completely wrong due to some severe misinterpretation of statements and facts. I have no idea which is true, and honestly don't care as I would never trust anything except open-source security apps like TrueCrypt for truly sensitive data (and I'd absolutely set it to automatically un-mount the device after a couple minutes of inactivity). If this software doesn't exist as described, good. If it does, it's just another reason that validates my having stopped using Windows for any personal activity. In either case, the above thinking is irrational and dangerous.
     
  14. Amon

    Amon inch-perfect

    Joined:
    1 Jun 2007
    Posts:
    2,467
    Likes Received:
    2
    If this trend continues, their next operating system will be called Open Windows (pun intended).
     
  15. Cthippo

    Cthippo Can't mod my way out of a paper bag

    Joined:
    7 Aug 2005
    Posts:
    6,783
    Likes Received:
    101
    Microsoft continues to be the best promoter linux ever had. Who needs to advertise when your competitioin actively drives customers to you?
     
  16. TheoGeo

    TheoGeo What are these goddamn animals?!

    Joined:
    10 Jun 2003
    Posts:
    2,218
    Likes Received:
    14
    Microsoft: "look how secure our OS is"
    Government minister: "wow great, now I don't have to worry if I leave my laptop in the back of a taxi"
    Microsoft: "look how easy our security is to break"
    Government minister: "Wait... what?"

    There is no chance of this staying out of evil hands, I give it a few weeks before it is leaked/duplicated
     
  17. Buzzons

    Buzzons Active Member

    Joined:
    21 Jul 2005
    Posts:
    2,976
    Likes Received:
    20
  18. metarinka

    metarinka New Member

    Joined:
    9 Feb 2003
    Posts:
    1,844
    Likes Received:
    3
    yah there's nothing on that usb tool that a highschool kid with google and bit-torrent could not also obtain. I mean to use a linux boot cd that had some cracking applications on it (not that I'm a hacker or anything at all). Very useful when people forgot passwords and the likes. It's naive to thinkt hat a stock box on any platform is "secure" in any fashion
     
  19. Bluephoenix

    Bluephoenix Spoon? What spoon?

    Joined:
    3 Dec 2006
    Posts:
    968
    Likes Received:
    1
    I personally still prefer using the firewire DMA trick for system penetration.


    and personally, I'm not worried.

    I do daily backups, which cannot be read except after going through about 6 levels of various types of encryptions with failsafes, and if someone tried to use the USB stick for command access, my laptop would do a 7 pass wipe of the drive in about 12 seconds (its an ssd)

    also, yes, everything on my computer is legal, but I like my privacy. =p
     
  20. fathazza

    fathazza Freed on Probation

    Joined:
    20 May 2002
    Posts:
    3,256
    Likes Received:
    16
    Bluephoenix are you trying to stop industrial espionage or just hiding extremely perverted porn collection.....

    I think "the man" should search your computer if only because you think you have something worth hiding :)
     
Tags: Add Tags

Share This Page