[LINK] Federal police asked to probe Google
Richard Chirgwin
rchirgwin at ozemail.com.au
Sun Jun 6 22:17:47 AEST 2010
Jan Whitaker wrote:
> At 09:39 PM 6/06/2010, Richard Chirgwin wrote:
>
>> A "payload" frame, however, has the destination address set. An
>> interface with the wrong address, upon receiving that frame, is supposed
>> to drop it (a behaviour that's been in Ethernet forever - the old coax
>> networks behaved like this). Sniffer software ignores what is an
>> explicit part of the standard - "drop frames not addressed to you". So
>> it's at least tenable to argue that anyone who captures frames not
>> addressed to them *is* breaching the TIA, irrespective of whether or not
>> the payload is encrypted.
>>
>
> Could this be a case of the programmer not paying attention to the
> standard? Google said whoever wrote it was 'experimenting' or
> something similar, part of their 'innovation' thing. If there were
> whiz kids writing code for them without proper training, that could
> happen. It could be a case of wow, neat, I wonder if I can bypass
> this or get that data without the sender knowing? If the coder had no
> sense of compliance requirements, it could easily happen out of pure
> ignorance. Doesn't excuse google from knowing what their code does,
> but I can see how it could happen.
>
A plea of mitigation might be valid, even if it doesn't change the fact
that a law was broken.
RC
> Jan
>
>
>
> Melbourne, Victoria, Australia
> jwhit at janwhitaker.com
> blog: http://janwhitaker.com/jansblog/
> business: http://www.janwhitaker.com
>
> Our truest response to the irrationality of the world is to paint or
> sing or write, for only in such response do we find truth.
> ~Madeline L'Engle, writer
>
> _ __________________ _
> _______________________________________________
> Link mailing list
> Link at mailman.anu.edu.au
> http://mailman.anu.edu.au/mailman/listinfo/link
>
>
More information about the Link
mailing list