[LINK] Federal police asked to probe Google

Richard Chirgwin rchirgwin at ozemail.com.au
Mon Jun 7 06:50:59 AEST 2010


Craig Sanders wrote:
> On Sun, Jun 06, 2010 at 10:05:09PM +1000, Jan Whitaker wrote:
>   
>> At 09:39 PM 6/06/2010, Richard Chirgwin wrote:
>>     
>>> A "payload" frame, however, has the destination address set. An
>>> interface with the wrong address, upon receiving that frame, is
>>> supposed to drop it (a behaviour that's been in Ethernet forever -
>>> the old coax networks behaved like this). Sniffer software ignores
>>> what is an explicit part of the standard - "drop frames not addressed
>>> to you". So it's at least tenable to argue that anyone who captures
>>> frames not addressed to them *is* breaching the TIA, irrespective of
>>> whether or not the payload is encrypted.
>>>       
>> Could this be a case of the programmer not paying attention to the    
>> standard?                                                             
>>     
>
> possibly. but it's certainly a case of Richard only understanding
> a small part of the standard and ignoring everything in it that
> contradicts the point he wants to make (which is that it's somehow
> unusual or "standards-breaking" to not drop packets "not addressed to
> you" - and identifying which packets are "not addr..." is far from as
> clear-cut and well-defined as he's stating)
>   
So point out the bit of the standard which I supposedly don't 
understand. Please do, I actually like getting new information.

RC
>   
>> Google said whoever wrote it was 'experimenting' or something         
>> similar, part of their 'innovation' thing. If there were whiz kids    
>> writing code for them without proper training, that could happen. It  
>> could be a case of wow, neat, I wonder if I can bypass this or get    
>> that data without the sender knowing?                                 
>>     
>
> it's not a matter of "bypassing" anything. it's more a matter of not
> bothering to put in a lot of extra work to filter out stuff (possibly
> because no-one had bothered telling him/her that it would be a good
> idea).
>
> capturing packets is easy.  filtering out the noise is hard.  
>
> and programmers are lazy. without detailed specifications they'll focus
> on the "interesting" bits of the program and ignore the boring bits.
>
>
>   
>> If the coder had no sense of compliance requirements, it could easily
>> happen out of pure ignorance. Doesn't excuse google from knowing what
>> their code does, but I can see how it could happen.
>>     
>
> AFAICT, it was when somebody higher up reviewed the code that the
> requirements were established.
>
> craig
>
>   




More information about the Link mailing list