P
pxie
Unregistered / Unconfirmed
GUEST, unregistred user!
p2p的又一力作:Peekabooty!
由著名的cDc(做bo2000的那个组织)制作,将于本月在Las Vegas的会议上首次公布。
比Napster、Gnutella、free*net更具破坏力的分式程序,是一个web浏览器。国外的
新闻有不少,值得期待的东西。不过,过一段时间,这东西估计就要被ip、dns封杀了
(就像free*net)一样!随便看一篇国外的新闻(其实都是旧闻了)吧!
对了,按说现在defCon也开过了,Peekabooty应该有下载了,可我使劲浑身法术就是
找不到!那位仁兄如果有,或者知道下载的地方,麻烦您说一声或发给我,我的
邮箱:g00d@263.net
Filter-Bypassing Web Browser 'Peekabooty' Coming Soon
By Steve Gold, Newsbytes
LONDON, ENGLAND,
16 May 2001, 12:47 PM CST
The Cult of the Dead Cow (CDC), the organization behind "sniffer" packages
such as Back Orifice, is developing an advanced Web browser that can
reportedly bypass company or governmental control systems.
Known as Peekabooty, the Windows-based Web browser is set for unveiling at
the July DefCon security event in Las Vegas.
Usenet reports suggest that the browser negates most security mechanisms
using an advanced proxy system to pull filesdo
wn from the Web or via FTP
(file transfer protocol), so bypassing at least some government- or
company-imposed filters.
The browser also can be set to send an anonymous request to one or more
"Peekabooty-friendly" servers, which can drawdo
wn the files requested -
also anonymously - and encrypt them for onward transmission, either via
FTP or e-mail, to the request originator.
The real potential security compromises start, sources suggest, when
Peekabooty users "open up" their browsers to allow their machines to
act as intelligent peer-to-peer reflectors for other Peekabooty users.
This could mean, for example, a Chinese Web user proxying out through
a US user's PC to gain access to files that have been blocked from
direct access, perhaps by the Chinese government.
Some media reports have suggested that the Internet Watch Foundation
(IWF) was planning to discuss Peekabooty at a meeting or conference
next week, but David Kerr, the head of the foundation said he was
unaware of any such plans, either for himself or his senior staff.
Kerr told Newsbytes that he was aware of the CDC's claims about
Peekabooty, and that, based on what he had heard about the Web browser,
he has no problems with the browser's capabilities.
"I've heard that it is capable of bypassing any corporate or government-
imposed censorship systems. If that's the case, then
we have no problem
with that, as we are an anti-censorship organization," he said.
Kerr added that the IWF developed its Internet Content Ratings Systems
(ICRS) to allow people to judge whether the information they were planning
to view was suitable.
"We have no problem with anything that seeks to allow users to gain
access to files that may have been censored or blocked by others," he said.
Over at Baltimore Technologies, Toby Walsh, a spokesperson for the
info-tech security firm, told Newsbytes that Baltimore's research team
are aware of Peekabooty and the CDC's claims for the software.
Walsh said that, while this may be good for freedom of speech, there is
concern that it could assist in committing crime and distributing child
pornography, for example.
"It's kind of like an electronic version of a discreet brown envelope,"
he said, adding that Baltimore's MIMEsweeper content management package
should protect organizations from any incursive effects that Peekabooty
might have.
Jonathan Tait, Baltimore's senior European product marketing manager,
said that, although Peekabooty appears to have been developed for ethical
reasons, there are concerns it may be abused and used maliciously to
circulate inappropriate files.
"Based on the information that we've seen, organizations can use a
combination of Web and e-mail content security solutions to protect
their businesses and employees from Peekabooty being used in a malicious
manner," he said.
"Reports claim that the browser will use all the machines in a network
to store data instead of a central server much like the music-sharing
technologies, Napster and Gnutella," he added.
Tait says that beating Peekabooty and software of its ilk comesdo
wn to
establishing and enforcing Web and e-mail usage policies.
"The browser has to point at a server or URL for it to work, and these
addresses will be listed somewhere," he said, adding that, by establishing
a policy to block these addresses and then
enforcing it using a Web content
system, organizations can protect themselves from Peekabooty being used
in a malicious manner.
Tait also advises companies that policies should also be established
and enforced for both Web based and Internet e-mail, to block all
encrypted data unless it comes from a trusted source.
"Also, if Peekabooty servers have distinguishing patterns such as
addresses, headers or content, MIMEsweeper could be configured to
detect and block these," he said.
Baltimore's Web site is at http://www.baltimore.com/ .
The CDC's Web site is at http://www.cultdeadcow.com/ .
The IWF's Web site is at http://www.iwf.org.uk/ .
Reported by Newsbytes.com, http://www.newsbytes.com/ .
12:47 CST
由著名的cDc(做bo2000的那个组织)制作,将于本月在Las Vegas的会议上首次公布。
比Napster、Gnutella、free*net更具破坏力的分式程序,是一个web浏览器。国外的
新闻有不少,值得期待的东西。不过,过一段时间,这东西估计就要被ip、dns封杀了
(就像free*net)一样!随便看一篇国外的新闻(其实都是旧闻了)吧!
对了,按说现在defCon也开过了,Peekabooty应该有下载了,可我使劲浑身法术就是
找不到!那位仁兄如果有,或者知道下载的地方,麻烦您说一声或发给我,我的
邮箱:g00d@263.net
Filter-Bypassing Web Browser 'Peekabooty' Coming Soon
By Steve Gold, Newsbytes
LONDON, ENGLAND,
16 May 2001, 12:47 PM CST
The Cult of the Dead Cow (CDC), the organization behind "sniffer" packages
such as Back Orifice, is developing an advanced Web browser that can
reportedly bypass company or governmental control systems.
Known as Peekabooty, the Windows-based Web browser is set for unveiling at
the July DefCon security event in Las Vegas.
Usenet reports suggest that the browser negates most security mechanisms
using an advanced proxy system to pull filesdo
wn from the Web or via FTP
(file transfer protocol), so bypassing at least some government- or
company-imposed filters.
The browser also can be set to send an anonymous request to one or more
"Peekabooty-friendly" servers, which can drawdo
wn the files requested -
also anonymously - and encrypt them for onward transmission, either via
FTP or e-mail, to the request originator.
The real potential security compromises start, sources suggest, when
Peekabooty users "open up" their browsers to allow their machines to
act as intelligent peer-to-peer reflectors for other Peekabooty users.
This could mean, for example, a Chinese Web user proxying out through
a US user's PC to gain access to files that have been blocked from
direct access, perhaps by the Chinese government.
Some media reports have suggested that the Internet Watch Foundation
(IWF) was planning to discuss Peekabooty at a meeting or conference
next week, but David Kerr, the head of the foundation said he was
unaware of any such plans, either for himself or his senior staff.
Kerr told Newsbytes that he was aware of the CDC's claims about
Peekabooty, and that, based on what he had heard about the Web browser,
he has no problems with the browser's capabilities.
"I've heard that it is capable of bypassing any corporate or government-
imposed censorship systems. If that's the case, then
we have no problem
with that, as we are an anti-censorship organization," he said.
Kerr added that the IWF developed its Internet Content Ratings Systems
(ICRS) to allow people to judge whether the information they were planning
to view was suitable.
"We have no problem with anything that seeks to allow users to gain
access to files that may have been censored or blocked by others," he said.
Over at Baltimore Technologies, Toby Walsh, a spokesperson for the
info-tech security firm, told Newsbytes that Baltimore's research team
are aware of Peekabooty and the CDC's claims for the software.
Walsh said that, while this may be good for freedom of speech, there is
concern that it could assist in committing crime and distributing child
pornography, for example.
"It's kind of like an electronic version of a discreet brown envelope,"
he said, adding that Baltimore's MIMEsweeper content management package
should protect organizations from any incursive effects that Peekabooty
might have.
Jonathan Tait, Baltimore's senior European product marketing manager,
said that, although Peekabooty appears to have been developed for ethical
reasons, there are concerns it may be abused and used maliciously to
circulate inappropriate files.
"Based on the information that we've seen, organizations can use a
combination of Web and e-mail content security solutions to protect
their businesses and employees from Peekabooty being used in a malicious
manner," he said.
"Reports claim that the browser will use all the machines in a network
to store data instead of a central server much like the music-sharing
technologies, Napster and Gnutella," he added.
Tait says that beating Peekabooty and software of its ilk comesdo
wn to
establishing and enforcing Web and e-mail usage policies.
"The browser has to point at a server or URL for it to work, and these
addresses will be listed somewhere," he said, adding that, by establishing
a policy to block these addresses and then
enforcing it using a Web content
system, organizations can protect themselves from Peekabooty being used
in a malicious manner.
Tait also advises companies that policies should also be established
and enforced for both Web based and Internet e-mail, to block all
encrypted data unless it comes from a trusted source.
"Also, if Peekabooty servers have distinguishing patterns such as
addresses, headers or content, MIMEsweeper could be configured to
detect and block these," he said.
Baltimore's Web site is at http://www.baltimore.com/ .
The CDC's Web site is at http://www.cultdeadcow.com/ .
The IWF's Web site is at http://www.iwf.org.uk/ .
Reported by Newsbytes.com, http://www.newsbytes.com/ .
12:47 CST