Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday December 12 2014, @12:38PM   Printer-friendly
from the opening-Pandora's-box dept.

Lily Hay Newman reports at Slate that Sony is counter-hacking to keep its leaked files from spreading across torrent sites. According to Recode, Sony is using hundreds of computers in Asia to execute a denial of service attack on sites where its pilfered data is available, according to two people with direct knowledge of the matter. Sony used a similar approach in the early 2000s working with an anti-piracy firm called MediaDefender, when illegal file sharing exploded. The firm populated file-sharing networks with decoy files labelled with the names of such popular movies as “Spider-Man,” to entice users to spend hours downloading an empty file. "Using counter-attacks to contain leaks and deal with malicious hackers has been gaining legitimacy," writes Newman. "Some cyber-security experts even feel that the Second Amendment can be interpreted as applying to 'cyber arms'.”

[Ed's Comment: As I understand it, the Second Amendment only applies in the United States or in its territories overseas — it doesn't give Americans the right to bear arms anywhere else in the world.]

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by M. Baranczak on Friday December 12 2014, @09:21PM

    by M. Baranczak (1673) on Friday December 12 2014, @09:21PM (#125596)

    I've been reading about this and they are not doing a "denial of service" attack. All they are doing is running bittorrent peers that serve corrupt data when asked. It is a really big stretch to say that responding to someone else's request with a bogus response qualifies as denial of service - nobody made them come to you with their hand out in the first place.

    You're right, it isn't a DOS attack. So what sort of attack is it? It seems conceptually similar to DNS spoofing, but of course it doesn't involve DNS.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2