Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Sunday January 18 2015, @03:02AM   Printer-friendly
from the or-is-that-what-they-want-you-to-believe? dept.

Some lighthearted news for the weekend!

The scene doesn’t include a keyboard. Or a computer mouse. But it shows why Michael Mann’s Blackhat may be the best hacker movie ever made.

For Parisa Tabriz, who sits at the center of the info-sec universe as the head of Google’s Chrome security team, it’s a Hollywood moment that rings remarkably true. “It’s not flashy, but it’s something that real criminals have tried—and highlights the fundamental security problems with foreign USB devices.”

Tabriz will also tell you that such accuracy—not to mention the subtlety of the scene with the coffee-stained papers—is unusual for a movie set in the world of information security. And she’s hardly alone in thinking so. Last week, Tabriz helped arrange an early screening of Blackhat in San Francisco for 200-odd security specialists from Google, Facebook, Apple, Tesla, Twitter, Square, Cisco, and other parts of Silicon Valley’s close-knit security community, and their response to the film was shockingly, well, positive.

http://www.wired.com/2015/01/blackhat-the-best-cyber-movie/

Did you find hacking accurately depicted in the movie ?

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by SuperCharlie on Sunday January 18 2015, @04:21AM

    by SuperCharlie (2939) on Sunday January 18 2015, @04:21AM (#135760)

    We are so far down the cyber road it is about time we get a decent portrayal of this. Like most of us here, I have been at this techy thing for a long time..almost 25 years and it pains me every time I see them guess the password in 5 seconds because of their cats name or their birthday or how they instantly can trace someone down to the floor because by God they have the IP address. I am putting this one on my actually go and see it at the theater list.. and thats a pretty rare deal for me.

    Starting Score:    1  point
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 4, Insightful) by ilPapa on Sunday January 18 2015, @04:59AM

    by ilPapa (2366) on Sunday January 18 2015, @04:59AM (#135761) Journal

    Like most of us here, I have been at this techy thing for a long time..almost 25 years and it pains me every time I see them guess the password in 5 seconds because of their cats name or their birthday or how they instantly can trace someone down to the floor because by God they have the IP address.

    My favorite is when the monitor of the computer being hacked shows an animated full-screen graphic of the password being revealed character by character. In order, from left to right, while the hacker nervously looks on.

    --
    You are still welcome on my lawn.
  • (Score: 3, Insightful) by Anonymous Coward on Sunday January 18 2015, @05:00AM

    by Anonymous Coward on Sunday January 18 2015, @05:00AM (#135762)

    *maybe*... lets wait and see if this 'positive' review is nothing more than a submit to a bunch of tech sites about 'how good it is' to get good reviews later on.

    Wait and see. It smells like a joe job. But then I am feeling rather paranoid today for some reason.

    • (Score: 0) by Anonymous Coward on Sunday January 18 2015, @05:31AM

      by Anonymous Coward on Sunday January 18 2015, @05:31AM (#135763)

      Paranoid... Sign of the times dude. Walk it off :-)

    • (Score: 1, Interesting) by Anonymous Coward on Sunday January 18 2015, @05:55AM

      by Anonymous Coward on Sunday January 18 2015, @05:55AM (#135764)

      Yeah, just look at all the hype [techdirt.com] about that TV show Scorpion and it is the most silly over-the-top portrayal of hackers I've ever seen. Just so dumb it is amazing that even actors with zero technical literacy can make it through an entire episode with a straight face. At least Poulsen has more credibility than the Scorpion guy, but his role in the Bradley Manning story is not flattering.

      BTW, joe job [wikipedia.org] doesn't mean what you think it means.

    • (Score: 2) by hankwang on Sunday January 18 2015, @08:00AM

      by hankwang (100) on Sunday January 18 2015, @08:00AM (#135778) Homepage

      "see if this 'positive' review is nothing more than a submit to a bunch of tech sites about 'how good it is'"

      In the case of Wired: the script writers consulted a Wired editor (Poulsen), so Wired isn't expected to be objective. Poulsen is probably contractually forbidden to say negative things, like "I argued forever with the writers that anyone with a clue would find this ridiculous, but they wouldn't listen and pushed that implausible plot device anyway"

    • (Score: 0) by Anonymous Coward on Sunday January 18 2015, @11:50AM

      by Anonymous Coward on Sunday January 18 2015, @11:50AM (#135805)

      I've read the Wired article and seen other hype for this movie like interviews with the director.

      Then the reviews came. [rottentomatoes.com]

      Giving Thor dude a 15 minute course in Linux doesn't make a good movie. And the last thing we need is more cyberhype when our cyberpresident is considering more cyberbills to fight cyberterror while cybershitting on Aaron Swartz's dead meat avatar [eff.org].

      • (Score: 3, Interesting) by maxwell demon on Sunday January 18 2015, @01:08PM

        by maxwell demon (1608) on Sunday January 18 2015, @01:08PM (#135811) Journal

        Looking at the reviews, I don't see any saying the hacker scenes are not authentic (which is all the article is about). They complain about a boring plot, bad character motives, bad filming … but the hacking depicted is nowhere criticised, as far as I see (I haven't read through all the contributions, though).

        So what I gather from the article plus the reviews:

        If you want to see a good film, better stay away. But if you are just interested in seeing realistic hacking scenes (and great gunfight scenes), this film is for you.

        Maybe they should use it in security education. ;-)

        --
        The Tao of math: The numbers you can count are not the real numbers.
  • (Score: 0) by Anonymous Coward on Sunday January 18 2015, @05:44PM

    by Anonymous Coward on Sunday January 18 2015, @05:44PM (#135842)

    The sysadmin frantically typing "ps -ef" and "kill -9" into the command window in Tron Legacy was a nice touch, though.

  • (Score: 2) by urza9814 on Monday January 19 2015, @05:44PM

    by urza9814 (3954) on Monday January 19 2015, @05:44PM (#136084) Journal

    how they instantly can trace someone down to the floor because by God they have the IP address

    Actually...a few years back when I was young and naive and running the Norton firewall thing (came with the system I think) whenever it detected an "attack" (Did I mention it was Norton? The "attacks" were never attacks...) it would give you the option to trace the location of the IP. And there was one instance where it traced it back to a specific floor of a specific building. Probably because it was a router owned by my ISP, most traces didn't give anywhere NEAR that level of detail...but still, depending on the system you're trying to trace, it may actually be possible.