decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Computer Crime Law Goes to the Casino | 189 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Computer Crime Law Goes to the Casino
Authored by: PJ on Friday, May 03 2013 @ 03:59 PM EDT
A web page with an obscure URL is not quite like an object abandoned on a public street, it's more like a small object (say a book) tossed into a very large field of tall weeds, or hidden under leaves inside a large wood, on land that is open to the public.

I'd say it's more like a book that a library would prefer most people didn't know they had, but want to have it on the shelf for those who will use it the way the library wants. Still, it's a book on the public shelf. And there's nothing barring access if you happen to stumble upon it.

That is a big difference from a book the library puts in its locked behind a glass collection that you have to sign up to access.

You absolutely can end up on an unpublicized url by mistake, just looking for something else. Making that criminal destroys something much more important than you realize. If you want a web page kept private, put it in a private space and don't let anyone access without the "key". Because if you put it on the public Internet, somebody will surely find it eventually, and if it's on the *public* Internet, that should not be a crime.

[ Reply to This | Parent | # ]

Computer Crime Law Goes to the Casino
Authored by: Anonymous on Friday, May 03 2013 @ 05:39 PM EDT
Sorry PJ, you are missing James Grimmelmann's point here. It's a purely
technical one.

Forget - for a moment - about whether it's data put up for public viewing or
not. In fact forget about the content entirely. It's not relevant.

Entering eOH7KvedHxS3iYRa in a box and typing ?pw=eOH7KvedHxS3iYRa is
technically the same thing. The receiving server code will see eOH7KvedHxS3iYRa
whichever way you do it.

If pw is the name of the password field - which is implicit in this example -
the program will use:
$input = $_POST['pw'];
to get info from the box, and
$input = $_GET['pw'];
to get info from the URL.
Either way $input will then contain eOH7KvedHxS3iYRa.

More realistically the code would be:
$input = isset $_POST['pw'] ? $_POST['pw'] : '';
$input = isset $_GET['pw'] ? $_GET['pw'] : '';
to guard against no input. But frequently the code will be combined as:
$input = isset $_POST['pw'] ? $_POST['pw'] : (!isset $_GET['pw']) ?
$_GET['pw'] : '');
meaning assign to $input if box is set then box value, else if pw= is suppled
then pw value, else nothing.

[ Reply to This | Parent | # ]

Computer Crime Law Goes to the Casino
Authored by: Anonymous on Friday, May 03 2013 @ 05:51 PM EDT

In theory, passwords should be security devices. The problem is that software, websites, and the like that require passwords, typically have rules that are designed to ensure that the password is broken within 30 minutes, by anybody that knows anything about cracking passwords.

The only legitimate reason for a site to reject a password such as "«σᚔᚕ6δϐᏬשب@15ᚑᚒ&#7 8128;ﺐﺧﺇﺨ&R!6S3|+67ᚓ»" is that it is too short.

When passwords are required to be pathetically weak, they are mere annoyances. Unfortunately, too many so-called security experts don't understand why passwords such as "gn!K^@3" are inherently insecure, and should never be allowed for anything more private than the office coffee maker. Worse still, financial institutions in the United States pretty much prohibit even that pathetically weak password, in favour of something that is even more insecure, and weaker.

On an unrelated matter, consider the effect on HR asking for passwords to FaceBook, etc, and being given something like "«ὌὐἇKiNḧк͖ΕɷɖŸ§ûאם ;ᡱヘボバ光備12兢ﺧ᥷ 2;凌»". Copy and paste might work. Transcribing it from hard copy probably won't work. Deciphering it from a handwritten note is guaranteed to fail.(I see the copy and paste to here failed to correctly display the glyphs.)

[ Reply to This | Parent | # ]

Computer Crime Law Goes to the Casino
Authored by: Anonymous on Saturday, May 04 2013 @ 01:01 AM EDT
One is a combination for a lock. The other a street address. Driving by all
the addresses on the map is not the same as breaking a lock.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )