Page 1 of 1

Hacking made simple.

Posted: Wed Jan 18, 2017 8:34 am
by heartbone
I loves me some amazing Professor Jim McCanney, and I have been a regular listener (as in every week) to his weekly radio show since 2006, if not a bit before then.
I remember what a big deal I thought the release of his amazing book on calculating prime numbers was.

In my early 1990s amazing game MONEYSTOCK on the Amiga computer, I placed the following in the game's initializing startup-sequence file.

Code: Select all

echo "In these days of Big Brother realize that"
echo "there is no such thing as 'electronic evidence'."
echo "EVERYTHING ELECTRONIC CAN BE FAKED."
echo
echo "                  THANK YOU FOR PLAYING MONEYSTOCK."
The old game is available for download at the archive.org and MONEYSTOCK is the only program that I know of that will hang up without fail using an Amiga emulator,
yet never fails to run perfectly on a real Amiga. Go figure.
The latest emulators seem to be an improvement, because on the earlier Amiga emulators the game would cause a guru meditation, usually just as it was getting really good.
It NEVER blows or hangs on a real Amiga.
If I really cared, I'd submit the game for them to use to fix the emulator, but instead I use MONEYSTOCK as a test to see when a fully functional Amiga emulator is released, if ever.

Back to my main point. In 2007 when I learned about Professor McCanney's discovery of how to generate prime numbers, I was intrigued, and immediately realized the awesome implication. I was sure that things were about to change in a big way! And for sure his discovery validated my long held view about anything electronic eventually being duplicated. Back in the day I wouldn't even allow an ATM card being attached to my bank account until it became mandatory. I setup no electronic access by me allowed for savings accounts, and require ink signature on paper only for transactions.

Now here we are 10 years after the huge (apparently hidden) discovery, the government intelligence agencies have practically merged with corporations, and they dictate content of certain computer operating systems. That being said for context, I'm sure that 99%+ of what Professor McCanney speaks about goes over people's heads. Perhaps even over most heads here?

However, last week he broke down what is happening in such a concise way, that I feel that most still reading this post will comprehend what the good professor spoke on, and will realize exactly the significance what it means when he predicts big changes over the next year. He's right, but I doubt if it will be progress, more like lock down as the authorities panic upon the severe onslaught of increasing "cyber attacks".

During real time credit card transactions, breaking the RSA codes is not gonna happen because one would still need a lot of infrastructure to actually intercept and utilize the information in time. But as far as databases, and server security, not knowing about this 10 year old vulnerability situation could lead to big problems. People are being easily being taken advantage of thinking something is secure, when it clearly has not been for over a decade. Worse yet, being forced to rely on and participate in said systems is problematic, as the good professor breaks down so well in this podcast.

http://www.jmccanneyscience.com/JamesMc ... 2_2017.mp3
Start at 26:00 and listen until 52:00 and be prepared to learn the real deal about "cyber security".
It's a true shame that James remains one of the hidden treasures of our time.
Peace in.

Re: Hacking made simple.

Posted: Wed Jan 18, 2017 8:56 am
by Keya
nevermind :?

Re: Hacking made simple.

Posted: Wed Jan 18, 2017 9:04 am
by heartbone
Keya wrote:squirrels also a big threat to cyber security, more hits on critical infrustructure than nation states :D I know, sounds nuts... *cringe*
http://arstechnica.com/information-tech ... of-course/
Image
I hope my memory is failing me here Keya, but aren't you the poster who unsuccessfully tried to discredit James in an earlier thread?
If I'm wrong I apologize for the mistake, but if so, then you may have a personal problem with him, and I must ask what's your point here?

I made mine, and it's rather serious for those who took the time to listen, something that you did not bother to do before posting.
Your post seems rather silly at best, possibly malicious in that you want to maintain ignorance if you are the one who previouisly attacked Mr. McCanney.
I honestly do not remember, but I do know it was a female.

I see that you added a line. Perhaps you should do as you suggest before you post next.

Re: Hacking made simple.

Posted: Wed Jan 18, 2017 10:13 am
by TI-994A
heartbone wrote:I loves me some amazing Professor Jim McCanney, and I have been a regular listener (as in every week) to his weekly radio show since 2006, if not a bit before then.
The simple hack's apprentice. :lol:

Re: Hacking made simple.

Posted: Wed Jan 18, 2017 1:09 pm
by DarkDragon
The seller has to keep the bill as well as the customer for the tax offices. Usually the bills contain the names etc.. "I'm not taking any information" => tax fraud?!

I would like to get some details about the hack, but in the audio stream he is repeating the same sentence over and over again and I can't listen to it that long. His website is somehow unstructured. Is the book somewhere available as ebook?

[EDIT]

Ah found it. You need "Breaking RSA Codes for Fun and Profit ePamphlet" and "Calculate Primes" according to the webpage, but it costs a bit money, which I don't have at the moment. I'd like to read the scientific paper about this, but there seems to be none.

Btw. I had the audio stream running in the background and I always hear "my webpage", "my book", ... this together with the website seems a bit like a home shopping tv channel. However I searched for his name in the libraries of acm and ieee and had no entry found.

[EDIT]

Btw. is it Jim or James now? Even his website has different versions of his name.

[EDIT]

Btw. usually every webpage collects personal information. At least if IPv6 or a static IP-address with IPv4 is used. It must be explicitly disabled that this information is stored on usual servers.

Re: Hacking made simple.

Posted: Wed Jan 18, 2017 1:42 pm
by TI-994A
DarkDragon wrote:...I searched for his name in the libraries of acm and ieee and had no entry found.
Here's one... :lol:

> James McCanney

Re: Hacking made simple.

Posted: Wed Jan 18, 2017 1:57 pm
by DarkDragon
I would assume that such important information would be published in form of a compressed paper, holding just the information how to break RSA. His website is barely readable with all the backgrounds and text formatting etc.. And it contains links to local files and such stuff:

Code: Select all

                          <link rel="File-List"
href="file:///C:/Users/James/AppData/Local/Temp/msohtmlclip1/01/clip_filelist.xml">
                          <!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]-->
                          <link rel="themeData"
href="file:///C:/Users/James/AppData/Local/Temp/msohtmlclip1/01/clip_themedata.thmx">
                          <link rel="colorSchemeMapping"
href="file:///C:/Users/James/AppData/Local/Temp/msohtmlclip1/01/clip_colorschememapping.xml">
I'd assume that he would make a compressed version of it without overformatting the font and without backgrounds, if his concern is to teach the world. But at the moment it doesn't really give me the impression of being serious.

@TI-994A: this is no acm/ieee entry, but on his website he says he has made an ieee publication.

Re: Hacking made simple.

Posted: Wed Jan 18, 2017 5:04 pm
by tj1010
Prime numbers don't really effect AES or CHACHA or EC or memory corruption bugs. The big players in cyber security. SWIFT and POS networks don't use RSA which doesn't matter anyway because most attacks are insiders or RAM-scrapers. The recent Euro-Asia SWIFT attacks were certainly insiders assisted by some Chinese hackers.

Consumerism and class warfare are used to control populations not break through in math. Except maybe AI where back-data is used on census or market data.

I'd be more worried about having secure infrastructure. When exploitable bugs don't exist or become too expensive it'll be the entities in the world with the most capital who will finally control everything without worrying about variables like remote access or data leaks or accountability in general.. Security research is a build-your-own-cell type deal. Found a buffer overflow? One step closer to freeing something like the Rothschild family of accountability and transparancy.

Isolation is the future of security not secure coding practices, and we already have good crypto.. Just look how effective browser and OS sandboxes are..