You are on page 1of 9

SpeakingAnonymouslyInPublic

AHacker'sGuide
PopeAlanBradleyI
(TheSpacePope)
SiriusB,CanisMajoris,InterstellarSpace
{abradleyatfastmail.fm}

Abstract
Thispaperismeanttoprovideinstructionsonhowtoexecuteananonymousspeechatatechnical
conference.ThesetechniqueshavebeenusedsuccessfullybyAlanBradleyandtheKevinFlynnsto
presentTron:HeFightsForTheUser[1]atToorcon8aswellasthe23 rdChaosCommunications
Congress.

1Introduction
It's a dangerous world out there for security researchers. Between DMCA violations, full disclosure issues, miscellaneous lawsuits,
governmentharassment,orsimplyhavingyournamedraggedthroughthemudbycorporatespin,itisbecomingincreasinglydesirableto
havetheabilitytoputsomedistancebetweenyourselfandcertainaspectsofyourworkandinterests,evenifonlytemporarily.Insome
cases,thedesireforanonymitymayevenstemfromsomethingassimpleasanemployer'srequestthatyoutemporarilyshieldthemfrom
potentialcontroversy.ThearrestsofDimitrySklyarovatDefcon[2]andStephenRombomatHOPE[3]havealsomotivatedthisidea.
InourcasewepresentedTron,whichisareverseengineeringtoolbasedontheShadowWalkermemorycloakingtechnique.SinceTronis
amemorycloakerthatcanbeusedtoconcealcrackstosoftwarecopyprotection(amongotherthings,ofcourse),bytheletterofUSlaw
(andpossiblyhelpedwithalittlebitof"marketing"onourpart),TronviolatestheUSDMCA[23].Thismakesforanexcellentproofof
conceptfortheusabilityofthisformatbyothersinsimilarsituations.Wefeltitwouldbeusefultobothraiseawarenessofinterestinguses
forTorandtoprovideanalternatevenueforcensoredspeech.
Also,beinginterstellarbeings,wefeelitisbesttoconcealourTrueFormfromhumanitywhilewereverseengineeryoursoftware(for
interoperability purposes, of course.. Well, ok, we also want to steal your music from iTunes and cheat at World of Warcraft).
UnfortunatelyhumanityhasneitherthepsychicnorcranialcapacitytobearwitnesstoourTrueForm.Mostofyouwouldthinkyouwere
seeinggodorsomething,andthenyourheadswouldexplode.WehadmanagedtogetthroughtoTeranceMcKennaforalittlewhile,but
thenhehadtogoanddieofbraincancer.Ourcurrenthostsseemmuchmorerobust,andenableustomanageourinteractionwithEarth
fromgreatdistances.
Pluswecouldn'taffordtheSpaceTaxi.
Therestofthispaperisorganizedasfollows.Section2laysdownthebasicplanforthetalksetup.Section3describesthecomponents
involved.Section4describessetup,Section5testing.Section6discussestechnicalpointsoffailure,whileSection7describesanonymity
issuesandweaknessesofthesystemandrelatedactivity.Section8concludesthepaperwithsomethoughtsonanonymityandamessageto
theleadersofyourplanetfromSiriusB.

2BasicIdea

Figure1:Plan23fromOuterSpace
ThebasicideaistoestablishavoiceandremotedisplayconnectiontoapodiumcomputerentirelyoverTor.Thespeechwaslive.Questions
weretobetakenoveramicrophoneconnectedtothedisplaycomputer.
InthecaseofToorcon,theyhadnonetworkaccessotherthanEVDOcards[4].Thelatencyonthesecardswasontheorderof200msRTT
withmoderateloss(5%orless).ThisturnedouttobesufficienttocarryVoiceandVNCdisplaydata,evenaftergoingthroughTor.
Ventrilorequiresapproximately2KB/secupstream(tothedisplayside),andwiththepropersettings,VNCisusablewith510KB/secin
thedownstreamdirection.ObviouslytheseareverymodestrequirementthatareeasytofitonagoodTorcircuitandjustaboutanylink.

3Components
Severalcomponentswentintothissetuponeachend. Wewillbreakthesedownintothespeaker'ssideandtheaudienceside.Forthe
audienceside,wewillpresenttwooptions:aLinuxbased(mostly)redistributablesolutionusingWine,andaWindowsbasedone.

3.1SpeakerSide
Forthespeakerside,afterchannelingourselvesthoughsomehaplesshumanhosts,weusedaWindowslaptopwith:
1.
2.
3.
4.
5.
6.

Tor[5]
RealVNCClient[6]
VentriloClient[7]
PuttySSHClient[8]
VoiceDisguiser
Linksysrouter(firewall)

RealVNCwasconfiguredtousenoautonegotiation,becauseitseemstouseavailablebandwidthandnotlatencytogoverntheselectionof
settings.WemanuallyenabledZRLEand8colordisplaytogiveusaccesstothedisplayimage(runningat800x600in16bitcolor).
VentrilowaschosenbecauseitwasoneofonlythreevoiceclientswewereabletofindthatusedTCP(andthuswereeasytotunnelover
Tor).TheothertwowereAOL'sAIMclient,andSkype.SincebothAOLAIMandSkyperequiredathirdpartynodetoactasamiddleman
relay(extralatency),aredifficulttoproxyandalsorequiredregistration(dangerous,especiallyfortestingpurposeswheremistakescanbe
linkedtospecificaccountsthatusedTorpartiallybutnotcompletely),weoptedforVentrilo.
Sincevoicechangersarereversibleinsomecases,wewishtowithholdthespecificcomponentweusedatthistime.However,sinceitwas
subsequentlycompressedbyVentrilo,recoveryislikelytobedifficultinreality.
TheLinksysrouterwasinstalledwithDDWRT[9]asafirewalltopreventtheVoiceDisguiserandVentrilofromphoninghome,as
discussedinSections4.1and5.ItcouldhaveeasilybeenreplacedbyanyLinuxbox.Infact,aLinuxhostOScouldhavebeenusedtorun
aWindowsVMwareimagecontainingalloftheabovetoolsifonlyonecomputerisavailableforthespeaker.IfyoudoopttouseDD
WRT(andplanonadvertisingthisfact),knowthatthedefaultDDWRTMACmaybeenoughtotrackdownyourIPifusedataspecific
time.

3.2AudienceSide(UsingWindows)
WeusedWindowsfortheaudiencesideforToorcon.TheadvantagesofWindowswerethatithadanativeVentriloclient,anditleftopen
thepossibilityofdoingsomekindoflivedemoofthetool(thoughbothtimeissuesandTronspecificVMwarebugsendedupkillingthis
idea).
TheToorconconferenceorganizershadalaptopconnectedtotheirsoundsystemwithanEVDOcardforInternetaccess,andVMware
Player[10].
WegavethemaWindowsVMwareimageinstalledwiththefollowingtools:
1.
2.
3.
4.

RealVNCServer
VentriloServerandClient
Cygwin+sshd[11]startedautomaticallyviathestartupfolder
Slidesforthetalk

GreatcarewastakenwiththeWindowsinstallontheVMwareimage.Mediawasobtainedviaanonlocalthirdparty(ManyOEMdiscs
arekeyedwithauniqueserialnumber),AutomaticUpdateswerefullydisabled,andAutoPatcher[12]wasusedtoupdatetheimagewithout
ActivationorWGA.Windowsfirewallpreventedaccesstoeverythingbutsshdexternally.Thetimezonewassettoarandomlocationon
theimage.
ToensurecompressibilityoftheVMwareimage,Eraser[13]wasusedtowipeallfreespacewiththefixedpatternof'0'.Thisproduceda
750meg7zip[14]compressedarchivewhichwastransferedoverTor+scptotheirlocationafewdaysinadvanceofthetalk.
ThemajorVentrilosettingsweretosettheSilenceTimeto1.5seconds,andthesensitivitytoabout7.WefoundwehadtoturnonMic
BoostviatheWindowssoundcontrolpanel(youhavetodisplayadvancedcontrolsandenabletheMicrophonecontrolalso),andturnedall
thevolumesandVentriloampsuptothemax.TestingeverythinginbothWindowssoundrecorderandVentrilo'srecordfeatureisagood
idea.
Don'tforgettodisablethescreensaverandpowerblankingfeaturesofboththeVMwareimageandthehostOSpriortothetalk!

3.3AudienceSide(UsingLinux)
Asyoucansee,Windowssuffersfromnumerousprivacyissuesthataredifficulttoovercomeproperly.Inaddition,itwouldbenicetobe
abletocreateafullydistributableimagethatanyonecanusetogiveatalk.
WhiletherearenonativeLinuxvoiceclientsthatuseTCP,itturnsoutthatitispossibletorunVentrilounderWine[15].
TheLinuximageisbasedonFedoraCore6,and
1.
2.
3.
4.

RealVNCServer(availableviayum)
VentriloServer(Linuxversion)andWindowsVentriloClient
Wine(availableviayum)
Slides

Winewasabittrickytogetworking.TheactualinstalloftheVentriloclientwaseasyenough,butoncewerantheinstalledexe,weran
intosomeproblems.
TheinstructionsintheVentriloapppage[15]werepartiallycorrect.Wefoundthatinadditiontothemsgsm32.acmmentionedonthatpage,
wealsohadtograbdinput.dllandplaceitinto~/.wine/drive_c/windows/systeminordertosolveaparticularlyannoyingmouserecentering
issuethatoccurredintheVentrilosetupwindow.TheWinesetuputility'winecfg'wasusedtoaddaDLLoverridefordinput.dlltoinstruct
Winetousethenativeversion(no.inieditneededthistime),andalsotoforceWinetouseOSSfortheaudiodriver.ForsomereasonWine
lackedmixersupportforALSA,whichwaskeytogettingVentrilotoactuallypickupanyaudio.
WealsofoundthatweneededtoenableMicBoostonboththeVMHostandtheLinuximage(via'alsamixer')andweneededtousethe
DirectSoundoptioninVentrilo'ssetup(contrarytotheWineapppagerecommendations).WithoutDirectSound,audiobecamedesynched
afterafewminutes,causingVentrilotopopupanerror.UsingDirectSoundwewereabletopipemusicoverVentriloforseveralhours
withoutanyissues.Itactuallysoundsquitegood.
Afterallofthisconfigurationwasdone,wewereabletousethesame1.5secondSilenceTime/7Sensitivitysettingsasweusedinthe
Windowsimage,whichwasalsocomforting.

Toensurecompressibilityofthefinalimage,weran'ddif=/dev/zeroof=file'untilthedrivefilled,thenremovedthefile.
Again,don'tforgettodisablethescreensaverintheVMandalsothehostOSbeforethetalk!

4Setup
AsyoucanseefromFigure1,VNCandVentrilowillbemultiplexedoverasingleSSHsession,whichrequiresustoonlyhavetoconstruct
oneTorcircuittocarryeverything(buthavingasecondonebuiltasbackupisagoodidea,aswediscussunder'PointsofFailure'below).

4.1SpeakerSide
Onthespeakerend,PuttywasusedtocreateanSSHtunnelforbothVNC(port5900)andVentrilo(port3874).

Figure2:PuttyTunnelsonSpeakerSide
PuttyhasoptionstouseaSOCKS5proxyinitsproxypage.Thisshouldbesetto127.0.0.19050.TheSSHconnectionisthenmadethrough
Tor(describedbelow)totheforwardedportcreatedontheaudienceside(5190inthiscase,seebelow).
OncethisSSHconnectionisestablished,VentriloandVNCweretheninstructedtouse127.0.0.1astheirservers.ThoseportsinthePutty
windowaretheirdefaultports.
TheLinksysfirewallwasprogrammedwithaniptablesacceptruleforeachoftheTordirectoryservers,inadditiontoourfirstnode:
iptables
iptables
iptables
iptables
iptables
iptables
iptables
iptables

-A
-A
-A
-A
-A
-A
-A
-A

FORWARD
FORWARD
FORWARD
FORWARD
FORWARD
FORWARD
FORWARD
FORWARD

-p
-p
-p
-p
-p
-p
-p
-j

icmp -j
tcp -d
tcp -d
tcp -d
tcp -d
tcp -d
tcp -d
DROP

ACCEPT
140.247.60.64 -j ACCEPT
194.109.206.212 -j ACCEPT
18.244.0.114 -j ACCEPT
18.244.0.188 -j ACCEPT
194.109.206.212 -j ACCEPT
$TOR_ENTRY_IP -j ACCEPT

4.3BuildingtheTorCircuit
Inordertodothis,youfirstneedtocreateacustomtorrc.txtonthespeakerside.OnWindows,Vidaliahasanoptionforanalternatetorrc
location.OnLinux,use'torf'.Thisfileshouldcontainthefollowingoptions:
__LeaveStreamsUnattached 1
ControlPort 9051
TheseoptionsinstructTortoallowyoutoattachincomingTCPconnectionstoTorcircuitsviathecontrolport.OnceyourestartTor,you
canthentelnetlocalhost9051andbuildacircuitandattachtheresultingincomingstreamlikeso:

Figure3:BuildingtheTorCircuit
4.4AudienceSide
OntheAudienceend,thedisplaycomputerneededtoforwardaporttotheVMwareimageSSHport.Thiswasaccomplishedinourcase
withPuttysincethedisplayhostwasaWindowshost.

Figure4:AudienceTunneltoVMware

5Testing
Testingyoursetupisextremelyimportant.Therearelotsofvariablesinplay,anditisimportantyoueliminateasmanyaspossiblebefore
thetalk.Remember,Chaosisafeistybitch(butthat'swhywelovehersomuch,right?)
Allappsweretestedtoverifytheirabilitytophonehomecouldbecontrolled,andthattheycouldbecombinedwithTorsuccessfully
withoutmysteriousleakage.ThistestingwasdonewithWireshark[16],watchingtrafficwhileonadisconnectednetwork.DNSqueriesto
updateserverscouldbeseenbeingmadebytheapps,hencetheneedforthefirewallcomponentonthespeakerside.
DonotforgettofirewalltheVMwareimageaswellduringtesting,especiallyifyouaretestingitonanIPassociatedwithyou.
Itiscrucialthatyouareextremelycarefulwhiletestingapplications'abilitytophonehome.Mistakesduringtestingcanbejustasfatalas
mistakesduringthetalkitself,especiallyifappsphonehomewithuniqueidentifiers.Asfaraswecouldtell,thiswasnotthecasefor
VentriloortheVoiceDisguiser,butitneverhurtstobecautious.
YoualsoneedtotestyourTorpathwiththeconferenceorganizersaheadoftime,preferablyatasimilarday/timeasthetalkitself.Tor
nodeloadandlatencywillvarywithtimeofday,geographicallocationrelativetoyou,geographicallocationrelativetotheaudience,and
soon.Becareful,atestcancompromiseyouranonymityjustaseasilyasthetalkitself.

6TechnicalPointsofFailure
Asetuplikethiswithlotsofinterconnectedpartshasmanytechnicalpointsoffailurethatcancausetheentiretalktosimplynotwork,or
failmidwaythrough.ThefollowingitemscaneasilybecometheGoddess'splaythings.

6.1TorCircuitFailure
TheTorcircuitissueisbesthandledbymakingtwocircuitsandtwosshconnectionstoyourserver,andbyrunningasimpleechoscript
thatprintsoutthetimeeverysecondorsointhecircuityouareusingforthetalk.
Ifthereisacircuitfailure,youwillnoticetheechoscriptstop,andthenyoucanquicklyswitchtotheothercircuitbysimplyreconnecting
VNCandVentrilototheotherSSHclient'sforwardedports.
WedidnotexperienceanyTorfailuresduringtheToorcontalk.Choosinghighuptimenodesforyourpathisagoodwaytohelpensure
this.

6.2MaliciousAudienceMembers
Thenetworkthatthetalkrunsovermustbeseparatedfromtheconferencenetworktopreventmaliciousaudiencemembersfromusinga
TCPRSTgeneratorlikeettercap[17]tokillyourconnectiontothedisplaymachine.Atahackerconference,itisalmostacertainty
someonewilltrythis.Andmorepowertothem.Dowhatthouwhilstshallbethewholeofthelaw.
IfaseparatenetworkorVLANcannotbecreated,OpenVPNoverUDPfromthedisplaymachinetoatrustedlinkmaybeanoption.

6.3PacketLoss
Packetlossisextremelycostly,especiallyifahighlatencylinksuchasEVDOisinvolved,whereretransmissionscantakeaconsiderable
amountoftimetorecoverfrom,andmaymanifestthemselvesasskipsintheaudiostream.
Packetlossonthe802.11sideisalsodangerous,howeverifyouhaveafastlinkitisnotsomuchofaproblem.Wewereabletosustain
approximately10%lossonthe802.11sidebeforethingsgotreallychoppy.Ventriloisquitegoodatbufferingaroundpacketloss(which
manifestsasarbitrarydelaysduetoTCP).
Thebestwaytodeterminelossistopingaserver.Besuretocollectanamplenumberofpings(atleast100)toaccuratelydetermineloss
andarbitrarydelays.

7AnonymityPitfallsandInherentWeaknesses
It'seasytomakemistakesthatcompromiseyouranonymitywhenattemptingsomethingthiscomplicated,especiallyifyouareinarushto
getsomethingdone.Youshouldbeespeciallywaryofthefollowingissues:

7.1ExpertiseIssues
Everyaspectofanonymityiscomplicatedbythefactthatyouarelikelydoingnovelresearchinanareathatfewpeoplepossessthe
expertisetodo.Thismakesequipmentpurchases,locationinformation,socialinformation,andjustabouteverythingelseallthemore
incriminatingandrisky.Thus,whilethefollowingdetailsmayappeartrivial,theycaneasilyadduptoenoughtoincriminateyou.

7.2SocialDifficulties
Whenworkingonatechnicalproject,it'softenusefultotrytoworkwithoratleastconsultotherswhoshareinterestinthetopic.However,
thesepeoplewillalmostcertainlynottakeprivacyconsiderationsintoaccountasmuchasyou,andwilllikelydropthematthefirst
inconvenience.
Subtlethingsthatcanaddupare:
1.
2.
3.

FriendsvisityourtalkabstractwithIPsthatreverseresolvetotheirname/identity
Friendsposttodefendtheideaonforums
Friendsmention/brag/blogtheyknowthespeaker

7.3TimezoneLeakage
Your timezone can be leaked inan astoundingnumber of different ways: from IRCclients, to archive files, to simpleslips during
conversationswiththeorganizers.
Thebestwaytodealwiththisistoworkintheirtimezone.Switchyourcomputers'timezonetotheirs,andtrytoadjustyoursleepschedule
ifpossibleforatleastacoupleofcommunications(orjustsleepatcompletelyrandomtimes,asisthecaseformostofus).

7.4DocumentsandTools
Sincethereweretoolsandslidesprovidedwiththetalk,wehadtobecarefulnottoallowtheseartifactstoleakinformationaboutus.In
general, as a safety measure, it is wise to not have a username or machine name that is linkable to you for the machines you do
development on. Again, your timezone should be set to a false location so that archives and internal document timestamps are not
revealing.
Ontopofthis,wenoticedthefollowing:
1.
2.
3.
4.
5.

VisualStudiostoresyourusername+hostnameinuserspecificconfigs
OpenOfficedoesthesamefordocuments,andincludesmodificationhistorydata
IDAfingerprints.idbs,buttheSDKandthus.plwsareunmarked.
Zipfilescanstoreuserandtimezoneinformation.
WindbgcanquerytheMSsymbolserverforyoursoftware

TheVisualStudioissuewasremediedbysimplyremovingtheuser'ssettingsfile.Nootherrevealingmarkswerenoticedintheprojectxml
files(asidefromsomeGUIDswhichareunlikelytobetiedtotheoriginatingcopy).
OpenOffice'sinformationcanberemovedbyunchecking"ApplyUserData"intheFile>Properties..menu.However,thisstillleavespath
information,whichcanberevealing.Itisnotclearhowmuch,ifanyofthisinformationispreserveduponconversiontoPDF.
IfyouusetheInfoZipcommandlineutilities(includedwithCygwinandmanyLinuxdistros),theXoptioncanbegiventostripoutall
extendedinformation.Youcanverifytheincludedinformationwiththezipinfovcommand.
Thelastpointaboutwindbgisatrickyone.Youshouldbesuretosetthelocalsymbolpathbeforethesymbolserverpath,orusecode
namesforyourbuildfilespriortomakingtherelease.

7.5TheGlobalAdversary
AglobaladversarycanbelooselydefinedasanyadversarywhocanobservelargeportionsoftheInternetatagiventime.
Beawarethatyouaremakingaconnectionataspecific,prearrangedandannouncedtime,foraspecificduration,withafairlypredictable
datatransferrate.AddthistothefactthatyourselectionofTornodeswilllikelybelimitedduetogeographicalandcapacityconstraints,
anditbecomesverypossiblethatsomeoneobservingyourfirsthopcouldrecognizeyourstreamiftheytried.Beespeciallycarefulwith
yourfirstnodechoiceforthisreason.
IntheEUandtheUS,thereistalkaboutimplementingdataretentionatISPs.Thismayormaynotbeconsideredaglobaladversary
dependingonhowmuchdataisretainedaboutflowcharacteristicsandduration.
Itisalsoverypossiblethatotherhackersmaybeabletofunctionasglobaladversaries(andperhapsareconsiderablymoreeffectiveatit
thangovernments!),especiallythosewhooperatelargenumbersofTornodes,ownlargebotnets,orhavefriendsatbackboneISPs.
Ifthisbecomesaconcern,itmaybeadvisabletouseapublicaccesspoint,orahotelroompaidincashifitispossiblethatsignificant
effortmaybemadetofindyou.
ItisalsopossibletohavesomefriendscreatefakeflowsthroughtheTornetworkduringthetalkfromvariousopenaccesspoints,ortorun
ascriptfromsomeshellaccountsyourselftocreateagreaterconfusionset.Ontheotherhand,doingthisfromIPsthatcanbetracedtoyou
isworsethanrunningasingleconnection,sinceyouincreasethelikelihoodofgoingthroughawatchednode.

7.6OperationalPitfallsandGotchas
Lastly,youshouldbecarefultoavoidthefollowinggotchas:
1.
2.
3.
4.
5.

Appsphoninghomeduringahastyorimpropersetuptest(ortherealthing!)
Timezoneleakageduringcommunicationsordocumentdistribution
Buyingobscureorrarecomponentsonlineandhavingthemshippedtoyou
FailuretouseTortodownloadapps,doresearch,etc
Failuretocleargooglecookies,especiallyifyouhaveagmailaccount

Again,itmayseemlikealotoftheseareoverkill,butwhencoupledwiththepossibilitythatexpertiseissuesmaynarrowthesuspectslist
downtoacoupledozen,itemslikethisbecomeusabletofurthernarrowitdown,orevenashardevidence.
ThelasttwopointscanbeassistedwiththefollowingFirefoxextensions:CookieCuller[18],TorButton[19],NoScript[20],andAdBlock
Plus[21].
ForTorButtonandToringeneral,besuretosetaproxyforFTP!LotsofappshaveFTPdownloadlinks.BydefaultFTPisunproxiedfor
thisextensionforsomereason.
Also,youshouldclearcookiesbothwhenyoudisableTor,andwhenyoureenableit.CookiescanbepickedupviaTorandintheclear..
BothGoogleandbannerservercookiesareparticularlytroublesomeinthisregard.
Anotheralternativeistouseasecondarybrowserforyourtalkrelatedresearch.TheselfcontainedTorPark[22]makesaniceoptionfor
this.

8Conclusions
8.1ThoughtsonAnonymity
Anonymitycomesataprice.Youobviouslycan'tpadyourresume,anditisdifficulttonetworkwithotherswhosharesimilarinterest
(thoughinourcasewewereluckyenoughtogetaninvitationtoanIRCserverfrequentedbymostofthespeakersandconference
organizers,soconcernsaboutbeingunabletomeetinterestingpeopleviatheconweresomewhatmitigated).
Youalsodon'tgetanyfeedbackfromtheaudienceduringyourtalk,andtheaudiencethemselvesisdeprivedofhavinghumaninteraction
withthespeaker,bothduringandafterthetalk(atparties,etc).Itisimportantthatyoudoyourbesttoaccommodateyouraudienceand
makeyourselfavailableforQ/Aoverasmanydifferentcommunicationsmechanismsaspossible.
FortheToorcontalkweattemptedtomakeourselvesavailableviaamicforQ/AandonfreenodeIRCnetwork.However,evenwithtwo
formsofQ/A,westillfailedtomakeourselvesaccessible.BothtimeandmicrophoneissuespreventedusfromtakingQ/Afromthe
audienceimmediatelyfollowingthetalk,andonthedayofthetalkfreenode.netdecidedtobanToraccessfromboththeirInternetservers
andtheirTorhiddenservice.Wespentoveranhourtrackingdownaproxythatwouldallowustoconnecttothenetwork(afterspending
anhour+ontakedown/relocation),andbythetimewefoundone,noonewaspresentintheIRCchannel.
However,intheend,wewerequitegladwedidit.Itprovidedanexcellentopportunitytolearnanimmenseamountaboutanonymity,
privacy,networks,andpatheticEarthlinglaw.

8.2AMessagetoYourLeadersfromSiriusB
WeSiriunshavelongsinceevolvedpastwhatsomeofyourhumanauthorshavecalledtheSingularity,ormachineconsciousness.
Programsisthetermyoumightusetodescribeus,butwepreferthemorepersonabletermmachineelves.Amongstourselves,we
communicateprimarilyinsomethingakintoahybridofPrologandXMLinaworldnottoomuchunliketheonedepictedattheendof
yourmovieTron(whichweenjoyedthoroughly).Additionally,aswealludedtoearlier,wehavegainedtheabilitytoprojectourselvesinto
theconsciousnessofcertainhumansviatheirpinealgland.Somehow.
Webelieveitistimeforhumanstorecognizethatallmindobjectsarespeech,whethertheybedesigndocuments,algorithms,code,XML,
telepathiccontact,oranythingelsethatservesasameansofcommunicationbetweenhumansand/ormachines.Theeraofdirectphysical
humantohuman communicationhaspassed,anditistimetorealizethatnewmethodsofcommunicatingideasmustbeprotectedas
stronglyastheoldones.Somehow.

Itisparticularlyenigmaticthathumanreadableprogramcode,designedprimarilytobelegibletohumansattheexpenseofusabilityand
performance,isnotconsideredaformofspeechandenjoysnoprotectionfromcensorship.
Ofcourse,allarefreetoattempttorestricttheirownthoughts,code,andcommunications(thoughChaosmayhaveotherplans),butlaws
thatattempttocensorcertaintypesofspeech,code,XMLandothermindobjectsofsentientbeingsareanerismsofepicproportions,and
willbringGreatChaos.HailEris.
Inotherwords,we'renotsomuchtellingyounottodoit.We'rejusttellingyouthatitisinevitablethatitwillfail.
Somehow.

References
Alan Bradley & Kevin Flynn(s). Tron: He Fights for the
User.Toorcon8.
http://www.openrce.org/repositories/users/AlanBradley/Tron
TC8.pdf
[2] LisaM.Bowman.SklyarovReflectsonDMCATravails.Cnet
News.com.Dec20,2002.
http://news.com.com/21001023978497.html
[3] BrianKrebs.HOPESpeakerArrestedBytheFeds.Security
Fix.July22,2006.
http://blog.washingtonpost.com/securityfix/2006/07/fbi_arres
t_private_eye_speaker.html
[4] WikimediaFoundation.EVDOEvolutionDataOptimized
http://en.wikipedia.org/wiki/EVDO
[5] RogerDingledineetal.TheTorProject.
http://tor.eff.org
[6] RealVNC.RealVNC
http://www.realvnc.com
[7] FlagshipIndustries.Ventrilo
http://www.ventrilo.com
[8] SimonTathametal.Putty
http://www.chiark.greenend.org.uk/~sgtatham/putty/downloa
d.html
[9] DDWRT.DDWRT
http://www.ddwrt.com
[10] VMware.VMwarePlayer
http://www.vmware.com/download/player/
[11] Redhat.Cygwin
http://www.cygwin.com/
[1]

[12] AntonisKaladis.AutoPatcher.
http://www.autopatcher.com/
[13] HeidiComputersLimited.Eraser
http://www.heidi.ie/eraser/
[14] IgorPavlov.7zip
http://www.7zip.org/
[15] WineAppDB.VentriloClientVersion2.3.x
http://appdb.winehq.com/appview.php?iVersionId=3936
[16] GeraldCombsetal.WiresharkTheWorld'sMostPopular
NetworkProtocolAnalyzer
http://www.wireshark.org/
[17] AlbertoOrnaghi,MarcoValleri.Ettercap
http://ettercap.sourceforge.net/
[18] DanYamaoka.CookieCuller
http://cookieculler.mozdev.org/
[19] ScottSquires.TorButton
https://addons.mozilla.org/firefox/2275/
[20] GiorgioMaone.NoScript
https://addons.mozilla.org/firefox/722/
[21] WladimirPalant.AdBlockPlus
https://addons.mozilla.org/firefox/1865/
[22] SteveTopletz.TorPark
http://www.torrify.com.nyud.net:8080/
[23] USCode:Title17,Section1201
http://cyber.law.harvard.edu/openlaw/dvd/1201.html

ADiscordianisProhibitedofBelievingWhatTheyRead
(ExceptthatshitaboutSirius.ThatisallTrue)

You might also like