Main » 2011 » Март » 16 » The task does not prove the data
11:48
The task does not prove the data

This is somewhat unformatted post.
This post is - a question for Habrasoobschestvu, the answer to which I do not know. Perhaps the answer is no. Personally, I could not get to the end to understand the exact formulation of the question.

This article, in addition - the memory of the man from whom I first heard about this problem.


So, I have the problem - one of the most famous representatives of the crack-scenes runet - ms-rem. I am sure many of you who have engaged in reverse-engineer, heard about it. ms-rem was not engaged releases. Instead, he wrote out the most interesting in its depth elaboration of the article. I do not know, maybe, someone came up with this problem before, then forgive me for my ignorance.

To begin, I offer you a brief interview given by ms-rem'om site cracklab.ru, it is interesting and easy to read.

At the end of an interview with the author cites the wording of tasks (spelling preserved):

typical problem is always easy enough to read manuals and articles, but there is a problem for which solutions must be head and think a lot of code in dizasme break and then debug not one week. Of these can be called task provable data.

That is, for example, has a triple, it transmits and receives any data needed to make it so that if a triple is found, and all the traffic that goes through the network can not be saved to prove that he transmitted any information, here is an example of one of the very complex problems.


Let me explain, though, and so everything is clear.

You - the creator of the trojan or any other network software (but let it be a Trojan). I am against the Trojans. We have a TCP / IP network. Your Trojan runs it and sends data from infected computers to host the attacker (and back), also located within the network. All traffic, running between any two hosts remains active equipment in a huge log from which you can easily find out who, when, where and what data is transmitted.

When a trojan you need to do so, that even having the presence of the code, and all network traffic, it was impossible to prove that he ever passed anything. In other words, it was impossible to prove that your Trojan is a Trojan, not asechny client. Something like that.

No, this is not a legal issue, exactly as the proof of guilt is not a question of virus writers, it is, I believe - an engineering problem. My opinion is that in theory there is no solution. I may be wrong.

So, one user Habra propose to reflect on theory, others - to offer practical solutions: as at least possible to complicate the proof of the functioning of the Trojan, if suddenly, in theory, the problem is not solved at all.

The problem is largely theoretical, the real application of a UFO I said nothing.

How to solve this problem? Is it relevant? What technologies, in addition to the encryption applied to conceal an object? Do not have listings on ACME better describe in words.

PS (offtopic)


If this problem has led someone else, I would have thought that this is nonsense. But knowing what qualifications had ms-rem, and the words he did not throw to the wind, I dare say that the problem is interesting, but its solution - informative.

A few words about the author.

I was lucky. Historically, I knew Roman (ms-rem) in person. It was an ingenious system programmer, the guru of his time. But what can I say, enough to read his article. His computer had been patched vulnerabilities that have not yet been published Microsoft. He had to debug, found and fixed. Do not believe me? I do not believe it. Looking at such enthusiastic people want to take a mountain of books and articles, and bore in the village and engage in, engage in engage in self-improvement.

Many publications have been somehow related to programming on the zero ring, drivers, memory models, Win NT and protection programs.

And his famous crackme has not been broken by anyone.

According to unconfirmed reports, ms-rem was killed in a car accident in January 2007.

Although many would argue that he simply left the scene beautifully. Well, that's his right. Whatever it was, his nickname then was silent forever. He may even read this post.

Finally a quotation from a single forum:
The logical end, but I think that is the death of Nick, but not a real person. But it seems under this name we will not see may appear under a different, but not standing out like a bright star in the sky. Well Well
in inete too, its legends, its own saints, its own heroes ...

Thank you for your attention. Please express their thoughts on sabzh in the comments.
Views: 447 | Added by: w1zard | Rating: 0.0/0
Total comments: 0
Имя *:
Email *:
Код *: