01.08.2013 Views

SiSU: - Homeland - Cory Doctorow

SiSU: - Homeland - Cory Doctorow

SiSU: - Homeland - Cory Doctorow

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Homeland</strong><br />

“Or someone's rooted your computer, or mine, or Ange's.”<br />

“Yeah.”<br />

That was the possibility that had been going through my head all morning. Someone with<br />

total control over my computer, someone with the power to light up the camera and the<br />

mic, to grab text off my screen or files off my hard drive. It wasn't a possibility I liked to<br />

think about. The darknet docs showed that Fred Benson had grabbed over eight thousand<br />

photos of one student alone, some poor kid the old bastard had a hate-on for.<br />

How many times had my computer been compromised? 0? Or eight thousand?<br />

And more importantly: if my computer had been pwned, had it been “random” -- someone<br />

scanning for vulnerabilities discovering my computer in a rare, unpatched moment and<br />

grabbing control over it -- or had it been “special”? That is, had someone targeted me? Like<br />

Godel, I wasn't sure I knew the difference between random and special any more.<br />

-..-<br />

I don't know what Jolu told Restless Agent and the rest of his buddies, but there was no<br />

darknet chat accusing me or Ange of being the leak. I still didn't know who Jolu's people<br />

were, and didn't want to know, but I kind of assumed that they were people he worked with<br />

and that he'd gone back from lunch and had a little chat with them -- hopefully away from<br />

any computers that might be covertly running their mics and cameras.<br />

But of course, no one wanted to do much chatting at all on darknet, not without knowing<br />

who and how someone or someones were eavesdropping on us.<br />

Long after the last person -- Liam -- had left Joe's campaign office, I sat at my desk, staring<br />

at my computer like it might have a live, venomous snake hiding inside it. I had stayed late<br />

at my desk, theoretically to finish up the day's work and make up for my little lunchtime<br />

face-to-face meeting, but also because I didn't want to try to deworm my laptop at home,<br />

not when I had an office filled with so many spare and useful computers lying around.<br />

In theory, it should be easy to secure (or re-secure) my laptop. Find another hard drive<br />

and create an encrypted filesystem on it. Boot up my computer -- or any computer! -- with<br />

a boot disk downloaded fresh from the Internet, after carefully validating the checksum to<br />

make absolutely, positively certain that I was using a clean, uninfected, pristine version of<br />

ParanoidLinux. Then I'd install a fresh build of ParanoidLinux on the new drive, copy over<br />

the user data from my old disk to the new one, and I'd essentially have given my computer<br />

a fresh brain with all the memories of the old one, but with a high degree of certainty about<br />

the brain's reliability and trustworthiness. It all worked best if you had a couple of spare<br />

laptops and hard drives lying around, which the Joe campaign had -- old laptops are one<br />

of those things that no one really wants to throw away, so we'd accumulated a lot of semiantique<br />

machines that had been donated by Joe's supporters.<br />

Figuring out whether the old machine had been infected at all was a harder, more subtle<br />

problem. If someone had infected the machine and altered the kernel -- the nugget at the<br />

<strong>SiSU</strong> www.sisudoc.org/ 116

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!