Berkeley CSUA MOTD:Entry 42188
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2006/3/10-13 [Computer/SW/Security, Computer/SW/OS/FreeBSD] UID:42188 Activity:low 72%like:42184
3/10    Isn't posner supposed to be smart?
        http://csua.org/u/f7i (news.com.com)
        \- What is your point? also since he would have been hearing it
           at the appelate level, his comment may be on some narrow legal
           point. i imagine he approaches this in interms of his econ
           approach about what ruling produces "efficient outcomes".
        \_ this is so fcuked up.
        \_ The guy who wrote the http://news.com.com must have read a different
           opinion than the linked Posner one.  Reading the linked Posner
           decision, what the http://news.com.com article claims are "two
           remarkable leaps" are actually just direct application of the
           US Code ("damage" includes "any impairment to the integrity or
           *availability* of data" [emphasis added]) or a previous decision
              \_ I disagree.  That US Code is "unconstitutionaly vague".
                 Simply deleting the files constitutes "impairent" to the
                 "availability of data." If attempting to delete the files
                 was a violation, then fine.  But the fact that he happened
                 (unlike most people) to know how to *actually* delete the
                 files, is, im(ns)ho, irrelevant.
           ("violating the duty of loyalty, or failing to disclose adverse
           interests, voids the agency relationship" State v. DiBiulio).
        \_ The way I read the statute, IAC needs to show the following
           in order to state a claim under the statute:
                1. Citrin knowingly transmitted a program
                2. To a protected computer; AND
                3. Citirn intentionally used that program
                4. To cause damage to the data on the computer; AND
                5. Citrin was not authorized to cause that damage.
           Posner is hearing the case on appeal from a dismissal for
           failure to state a claim. Basically, at this point his
           job is to assume that Citrin actually did all the things
           IAC says he did and figure out if that would be enough
           for IAC to get relief.
           Added to this is the suggestion that some of the data
           that was deleted may have been incriminating evidence
           re a breach of contract or breach of the duty of loyalty
           claim.
           Given that it is so early in the game and the potential
           destruction of evidence Posner seems to think that it is
           probably a good idea to have Citrin tell the trial judge
           his side of the story before the case is dismissed.
           Re "damage" == "delete": To me, it seems clear that it is
           within Congress' power to reach unauthorized deletions of
           data from a protected computer under the Commerce Clause.
           If you access my computer w/o my authorization, intentionally
           install srm(1) and then srm /bsd, I think Congress has the
           power to hold you liable.
           I don't see the 5th amend vaguness argument, please explain.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
2011/2/14-4/20 [Computer/SW/Unix] UID:54039 Activity:nil
2/14    You sure soda isn't running windows in disguise?  It would explain the
        uptimes.
        \_ hardly, My winbox stays up longer.
        \_ Nobody cares about uptime anymore brother, that's what web2.0 has
           taught us.  Everything is "stateless".
           \_ You;d think gamers would care more about uptime.
	...
2010/8/12-9/7 [Computer/SW/Languages/Perl] UID:53922 Activity:nil
8/12    Ruby coders, do you mostly DIY your stuff or use the ruby libs out
        there?   How is their quality compared to other libs you have used
        for other langs?  Thx.
        \_ I use Ruby for hobby stuff, etc.  I use libraries for system stuff
           (web access, process, etc.) but that's about it.  Perl libraries are
           much better/more complete.  I assume because of the maturity and
	...
2010/2/22-3/12 [Computer/HW] UID:53723 Activity:nil
2/20    There was a failure validating the SSL/TLS certificate for the server
                                          <DEAD>mail.csua.berkeley.edu<DEAD>
        The reason for the failure was
                          self signed certificate in certificate chain (details)
        We have not verified the identity of your server. If you ignore this certificate validation
        problem and continue, you could end up connecting to an imposter server.
	...
Cache (57 bytes)
csua.org/u/f7i -> news.com.com/Police
Options Search The page you've requested cannot be found.
Cache (204 bytes)
news.com.com
The firm that found the flaw says the problem is more serious. These are some of the more interesting stories based on topics such as the people behind the company, the investor angle and the big picture.