lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4228DD69.6030000@pwarchitects.com>
From: dk at pwarchitects.com (dk)
Subject: Bios programming...

Bill Humphries wrote:

> 1) It is easily circumvented.
> 2) It violates the privacy of other users.
> 3) It can easily generate false positives.
> 5) It could be exploited.
> 6) Who decides what is a 'suspect site'?
> 7) Trustworthiness of the Monitoring Organization
> 8) Trust vs. Pervasive Surveillance

I agree completely with 1-8. This project seems very short-sighted and 
ill conceived. Fraught with social and moral repercussions well beyond 
"those who are helped"... I don't care that other projects have claimed 
to provide similar solutions. Emulation does not imply correctness any 
more than a talking myna bird espouses Truth.
I also question that the knowledge/skill set of the O.P is not up to 
task, but that's solely based on his verbiage and lackadaisical 
sentences regarding CMOS, BIOS and the like.

> Several people said they felt a legitimate need for this software citing 
> "pornography addiction."
> 
> I've emailed a few friends who are in grad programs and clinical 
> practice to confirm if there's an actual diagnosis of "pornography 
> addiction". Sorry, the term feels loaded, like something tossed about 
> during a congressional hearing.

I spoke with two Psych PhD. friends about this over lunch today, one 
male one female. They both expressed concern over this approach; 
likening it to medicating a client without proper diagnosis or therapy. 
One commented that if such an observable "pornography addiction" exists, 
is it likely part of a much larger sexual dysfunction that could 
actually be exacerbated by this type of behavior modification. Not to 
mention what it could possibly grow into once the conditions feeding the 
behavior change. i.e. the electronic chastity belt is removed or breaks; 
or the "addiction" takes on a different expressive form; or...

Personally I find outrageous that we continually mis-classify and over 
simplify cultural problems and try to devise such technological 
solutions to limit human behavior. The fact that this was honestly 
posted to Full-Disclosure as a serious question demonstrates the already 
flawed approach being taken.

[snip very good AA comparison]

> And when, if ever, do you build trust with the person who you have said 
> you have harmed? It strikes me as too easy to leave the secret policeman 
> on forever. But now there's a third pillow in that bed, and I get the 
> feeling that you do not condone polyamory.

I get the feeling that this may be motivated by a religious association 
with an agenda besides just specific sexual dysfunctions, then again 
perhaps not. The site at www.dynamicanswers.com seems very MS/Win32 
centric, so while I expect the O.P. to be well versed in win32/mfc 
solutions, I do no suspect much else. Which is what this undertaking 
would require. Either way, people tend to over step their bounds of 
experience when providing solutions. To them I would say: Most times you 
are not there 5 or 10 years later to clean up the mess you helped make; 
albeit with misguided good intentions.

How does that old quote go?

> That's why I made those remarks comparing your plan to the abuses of 
> Mao's Cultural Revolution. You privatize the intrusive, something which, 
> until recently, was the domain of totalitarian states.

"Privatize the intrusive" that's very excellent and succinct Bill. 
Though in a way, I'd submit that The Church has had their hands in this 
too (God is watching you, etc...) Though "privatize" may not exactly fit 
that, they construct systems for similar goals: Control.


-- 
dk

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ