| ==Phrack Magazine== |
|
|
| Volume Seven, Issue Forty-Eight, File 17 of 18 |
|
|
| **************************************************************************** |
|
|
| International Scenes |
|
|
| There was once a time when hackers were basically isolated. It was |
| almost unheard of to run into hackers from countries other than the |
| United States. Then in the mid 1980's thanks largely to the existence |
| of chat systems accessible through X.25 networks like Altger, tchh and |
| QSD, hackers world-wide began to run into each other. They began to |
| talk, trade information, and learn from each other. Separate and diverse |
| subcultures began to merge into one collective scene and has brought us |
| the hacking subculture we know today. A subculture that knows no |
| borders, one whose denizens share the common goal of liberating |
| information from its corporate shackles. |
|
|
| With the incredible proliferation of the Internet around the globe, this |
| group is growing by leaps and bounds. With this in mind, we want to |
| help further unite the communities in various countries by shedding |
| light onto the hacking scenes that exist there. If you want to |
| contribute a file about the hacking scene in your country, please send |
| it to us at phrack@well.com. |
|
|
| This issue we have files about the scenes in Sweden and Brazil. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| The Swedish Hacker Scene |
|
|
| It's about time to fill up this hole in the worldwide history of hackers |
| published in the Phrack series of articles on national scenes. Since no |
| one else seems to be getting around to do it I'd better do it myself. |
|
|
| Sweden was in fact one of the countries in the front line during the |
| birth of computers in the 1940's and 50's. By 1953 KTH university in |
| Stockholm built BESK, at the time being the fastest and most advanced |
| computer in the world. During the late 1960's Linkoping university |
| specialized in computer science and in 1973 the computer society Lysator |
| started out as an offshoot of american hacker culture of the kind you |
| could find at MIT during the 60's and 70's. They are still active and |
| often referred to as the first Swedish hacker society ever, which is |
| indeed true. Now days they still adhere to the international hacker |
| ethic of university societies and among their lines are as well idiots |
| as real bright guys (as is the case of most such societies) and their |
| contributions to the world of e-culture include Project Runeberg; a text |
| archive of Scandinavian literature, and a voluminous FTP archive. |
| There's actually a lot of ASCII work being done at Lysator, including |
| converting Phrack back issues to HTML format. |
|
|
| Despite the early interest in computers in Sweden there was no |
| equivalent to the American phreakers of the 1970's. This was not caused |
| by lack of knowledge but rather by dullness. Sweden was during the 70's |
| and early 80's in a period of both economic wealth and social mentality |
| commonly known as "The Welfare State". Everybody was facing the same |
| high economic standards, nobody was really displeased with Swedish |
| society, and the government granted lots of spare-time activities for |
| youths. Thus the growing ground for any outlaw societies was withdrawn. |
| (Eg Hells Angels didn't start out in Sweden until the 80's.) Swedes were |
| in fact too pleased, too wealthy and too filled up with their vision of |
| an almost utopian society to even get the faintest glimpse of an idea to |
| form any underground movements. Even political groupings like |
| Anarchists, Hippies (in Europe referred to as "Provos") or Fascists were |
| almost WIPED OUT by the extreme political climate and wealth of the |
| 70's. |
|
|
| Thus, phreaker culture couldn't possibly start out in Sweden at this |
| time, though some freaked out engineers and radio-amateurs might have |
| built blue boxes and similar equipment for their household needs. This |
| state of society caused Sweden to lag behind other European and |
| Scandinavian countries in the field of outlaw hacking. |
|
|
| The first hacker activity in Sweden was reported by the authorities in |
| 1980. The hacker in question was a student at Chalmers university in |
| Gothenburg and was sued for manipulating the account system into |
| granting him free access to the mainframe, for which was sentenced to a |
| relatively light fine. Apart from some similar incidents carried out by |
| bright individuals there was no real H/P scene until 1984. Also in 1980 |
| BBS activity started out in Sweden. Most enthusiasts were using a |
| Swedish micro built by Luxor and DIAB in 1978 called ABC-80 (Obviously |
| inspired by the American TRS-80). These enthusiast, however, were well |
| organized engineers running a straight user-group, no anarchists or |
| radicals of any kind were ever involved. |
|
|
| In 1984 a magazine called "Rolig Teknik" started out as an offshoot of |
| YIPL/TAP featuring the same kind of material, and by 1987 some |
| journalist "discovered" this magazine, causing a lot of noise throughout |
| The Welfare State and bringing people out in a public debate of how to |
| defeat this magazine. (Though it actually didn't feature any illegal |
| material; even Sweden has the freedom of speech and press written |
| explicit in its constitution, as in the American First Amendment.) |
| "Rolig Teknik" rapidly became a cult media for underground electronic |
| freaks, outlaw radio amateurs, and other antisocial movements. But let's |
| not get ahead of events. |
|
|
| By early 1984 two youths aged 17 and 19, clearly inspired by the movie |
| "War Games", hacked their way into several Swedish computer systems |
| using a simple Apple II and a 300 baud modem, notably DAFA-Spar - a |
| register containing public information on every Swedish citizen. Though |
| there were no secret data in this computer, and though these hackers |
| never succeed in gaining root access, the incident was annoying to the |
| authorities. Also this year, some wealthy upper-middle class youths |
| started using the was-to-become major European home computer: the |
| Commodore 64. What the Apple II was for America, the C-64 was for |
| Europe. Enter the software crackers. |
|
|
| C-64 was THE symbol of hackerdom to Swedish youths in the 1980's. As |
| software cracker Mr.Z pioneered the hacker scene in 1983 with hundreds |
| and hundreds of cracked games, Swedish hackers somehow got to believe |
| that cracking games was the Big Thing for any hacker. Besides, not many |
| of these guys had modems. By 1987 American game producers were alarmed |
| by the Niagara of cracked C-64 software being downloaded from Europe, |
| causing them to start copy-protecting games that were to be exported to |
| Europe. A closer examination showed that a lot of these cracks were made |
| by Swedish groups, notably Triad and Fairlight. Thus, most Americans to |
| get in touch with the Swedish hacker scene were what you would refer to |
| as the "Warez D00ds" or "Pirates" of the time. Since the Swedes were |
| unable to phreak due to lack of knowledge in the telecom field, American |
| warez d00ds constantly called up Swedish crackers to obtain the latest |
| software. |
|
|
| There seems to be some kind of misconception in the American view of the |
| hacker culture of Europe: Not very many hackers in Sweden and the rest |
| of Europe got into phreaking nor net hacking in these early years, |
| perhaps with the exception of the movement in Germany caused by Chaos |
| Computer Club. By tradition most European hackers in general, and |
| Swedish hackers in particular, turned to software cracking and demo |
| programming. (The Demo as an art form was invented in Europe during |
| 1984-86.) None of these activities were actually illegal at the time |
| being, though indeed underground. This might have helped to create the |
| general American view of European hackers as "Idiotic Immature Warez |
| D00ds". In fact, most European hackers look upon software cracking and |
| demo programming with pride, though spreading (warez trading) wasn't |
| considered a real hacker activity, and pirating for economic gain was |
| looked upon with disgust and utter contempt. Software spreading in all |
| forms was finally outlawed in Sweden January 1st 1993. |
|
|
| 1986: Enter the Netrunners. |
| By the year 1986 the legendary BBS "Tungelstamonitorn" under the |
| supervision of Jinge Flucht began distributing H/P and Anarchy files. |
| Jinge himself, being a social inspector and thereby fully aware of the |
| state of society, was upset with The Welfare State and thought the |
| Swedes had gone law-abiding in an absurd and unhealthy manner. In his |
| view people seemed to accept laws without ever questioning them, thereby |
| making Sweden into a conformistic utopian hell. Later Jinge joined the |
| Fidonet where he got known for running the most explicit and intense |
| debates in Swedish BBS-culture ever. |
|
|
| Probably the H/P files stored at Jinges BBS were the spark that lit the |
| Swedish net hacking scene. Swedish hackers had SEEN "War Games", HEARD |
| about the CCC in Germany, and now they finally got their hands on |
| documents that explained the techniques. In 1987 excerpts from Steven |
| Levy's "Hackers" and Bill Leebs "Out of the Inner Circle" were reprinted |
| in the Swedish computer- magazine "Datormagazin" by editor Christer |
| Rindeblad, creating a common group-awareness among Swedish hackers. |
| ("Out of the Inner Circle" had actually been translated to Swedish |
| already 1985, but was obviously read mostly by security experts and War |
| Games-obsessed wannabe's.) 1987 also saw the birth of the first |
| all-Swedish hacker group ever to make themselves a name outside |
| Scandinavia. This was of course SHA - Swedish Hackers Association. |
|
|
| SHA wanted to be a hacker group of international standards and |
| qualities. They collected the best people, storing up a knowledge basis |
| for future use. In the years 1989-92 SHA was at its height, successfully |
| trashing computer companies and computer scrap dumps and gaining access |
| to hundreds of computers. Inspired by the German hackers Pengo and |
| Hagbard in Leitstelle 511 they started having regular meetings on |
| fridays at their own booked table in a restaurant in Stockholm. Their |
| perhaps biggest achievement ever was made in 1991 when they wrote a |
| scanner to exploit the Unix NIS-bug, running it on 30 processes |
| simultaneously, and ending up with some 150.000 passwords whereof 600 |
| gained root access. Though some would say SHA were a bit too fond of the |
| media image of hackers and sometimes had a weakness for hacker cliches, |
| no one can really deny their achievements. |
|
|
| Swedish hackers also got a lot attention for their carding activities in |
| 1989. Both Sneaker of SHA and Erik XIV of Agile wrote modulo |
| 10-calculators to produce endless series of valid Visa-numbers. Erik XIV |
| was even on national television, demonstrating the weaknesses of the |
| credit card system. Cynically they were both busted. |
|
|
| At Christmas 1990 the Swedish X.25 network Datapak and Decnet were both |
| attacked by a group of UK hackers called 8LGM (8 Little Green Men or |
| 8-Legged Groove Machine - I don't know which one is a media nick). Using |
| a war dialer they scanned about 22.000 entries and successfully accessed |
| 380 of these. This is perhaps the most well-known of all hacks in |
| Sweden, causing a lot of media noise. (The exact figures are a product |
| of the Swedish telephone system AXE that I will write more about in a |
| moment.) As reported in Phrack #43 they were busted and convicted under |
| the new British anti-hacker law. |
|
|
| Later Swedish achievements include the phonecard emulator, constructed |
| by Atari ST enthusiast Marvin in 1992, after hearing the Swedish phone |
| company Telia boast of these prepaid phonecards superior security. |
| Though these silicon-based chip phonecards (256 bytes serial EPROMs) |
| couldn't actually be recharged or easily tampered with, he realized |
| there was no problem in emulating the chip with a Motorola 68c705 |
| one-chip computer. Some fake phonecards were manufactured and sold for |
| almost nothing among his very best friends more on a "See, it can be |
| done"-basis than with any intention to defraud Telia or earn heaps of |
| money. Somehow the blueprints for the emulator found its way into the |
| Internet. |
|
|
| Swedish hackers in general have a very strong tradition of forming |
| groups, due to their roots in programming activities rather than |
| phreaking. Group awareness and culture is very widespread and accepted |
| within the boundaries of the whole Swedish computer underground. Thus, |
| LOYALTY is very strong among Swedish hackers. Most hackers who get |
| busted by authorities or blackmailed by companies would rather DIE than |
| telling the name of even a single 10-year old warez d00d. |
|
|
| While we're at it - hacker busts, and phreaker busts in particular, are |
| carried out in quite a disturbing manner in Sweden. To explain this I |
| must first explain a bit about the Swedish telephone system. |
|
|
| Almost all Swedish networks use a system similar to 4ESS, constructed in |
| cooperation by the State Telecom "Televerket" and Swedish |
| telecommunications equipment producers Ericsson Telecom. This system is |
| called AXE, which is an abbreviation for Automatic Cross-Connection |
| Equipment. AXE is used in some 100 countries all over the world and |
| probably one of the most beautiful exchange systems ever developed. AXE |
| is designed for national, metropolitan and rural networks, and the same |
| system nucleus is used in all the different systems. It can control both |
| digital and analog equipment, though it's made with the aim on |
| transforming all Swedish networks from analog to digital connections. It |
| also comes with a fully featured bureaucratic organization for |
| maintenance, administration and economics in general. AXE has the |
| capability of building virtual groups in switching-stations, thus |
| putting your PBX into the telco soup as well, making you believe you |
| have the control over it though it's actually located elsewhere. |
|
|
| In short, this is an centralized, monolithic system of the horribly |
| efficient type that telcos love. It tells any amateur to keep their |
| hands off and do something else. Of course it's a system that hackers |
| and phreakers hate, since it's limited to authorities. The filthy crowd |
| do not know what is going on inside these exchanges, and the telcos like |
| to keep it that way. |
|
|
| AXE also works with stored program control that resides inside the |
| system core of every switching station. Of course this is all software, |
| and of course State Telecom, upon building AXE, couldn't hold back their |
| Big Brother tendencies. |
|
|
| The result is that every call made from anywhere to anywhere, is logged |
| in a central computer. Now that's something! Not only did this equipment |
| wipe out every possibility to box within Sweden, but it also removed all |
| kind of phone privacy. In fact not only calls are logged, but ALL |
| activity performed at your terminal. If you lift the handset, press a |
| digit and hang up, time, date and the digit you pressed is registered. |
| All this data is stored on magnetic tapes for 6 months. |
|
|
| Now, luckily Sweden has a strong Computer Privacy Act. You just aren't |
| allowed to set up and use such facilities as you please, not even if you |
| are the State Telecom. There is even a specific authority, |
| "Datainspektionen" (The Computer Inspection Department) with the only |
| purpose of looking after and preserve citizen privacy by protecting |
| individuals from corporate and governmental interests. As a result State |
| Telecom "Televerket" (which later changed name to "Telia" as they were |
| transformed from an authority into a private corporation as of July 1st |
| 1993) were not allowed to give out any of the information gathered in |
| these registers to anyone else than either the calling or the receiving |
| party. Not even the police could have this information in case they |
| weren't suspecting a indictable crime resulting in at least 2 years of |
| prison, such as drug trading or terrorism, and you don't get that kind |
| of penalty for phreaking alone - at least not in Sweden. |
|
|
| But Telia could evade these restrictions. In order to successfully |
| phreak using PIN-codes, you have to call an operator using a Swedish |
| version of the 800-number: a 020-number. Telia could then claim the call |
| was made to the owner of that number: AT&T, MCI & Sprint mostly. (There |
| are of course Calling Cards in Sweden as well: "Telia Access" - neither |
| used nor abused by anybody.) As well as these companies have their own |
| intelligence agencies, so have Telia. Once eg AT&T had someone traced |
| for phreaking, Telia could easily produce a complete list of calls made |
| to AT&T operators from a certain number. Telia themselves would even use |
| information they weren't allowed to: they would pull out a list of ALL |
| outgoing calls from the phreaker in question including calls to MCI, |
| girlfriends, mom, dad, grandma... all logged calls. |
|
|
| Telia would then call this poor phreaker to their local Swedish office, |
| sticking the endless list under his/her nose, commanding: "TALK, or we |
| will turn you in to the authorities", carefully not to mention that all |
| information on the printout would be absolutely useless in court. The |
| only conclusive evidence would in fact be those calls traced back all |
| the way from America or wherever the phreaker called; in that way |
| rigorously documented. Naturally, the common phreaker had no legal |
| experience and wouldn't know about this. Instead he would talk, giving |
| out detailed information on his/her techniques worthy of a full-time |
| high-educated security consultant. After this session the phreaker was |
| given a bill of the calls that could indeed be proven in court. If |
| he/she didn't pay it - Telia (or any other operator) would end up |
| turning him/her to the authorities anyway. So much for cooperation. |
| Telia themselves would, if they felt it was necessary, go even further |
| than the overseas operators, systematically exposing every weakness in |
| the phreakers personal life, using the information in the computer log |
| for psychological terror. |
|
|
| This pattern of treatment of Swedish phreakers seems to be very much the |
| same among all telecom providers in Sweden. Lately Telia, under command |
| of security officer Pege Gustavsson made some noteworthy mistakes |
| though: in their efforts to convict as many phreakers as possible, they |
| called up companies receiving calls from "suspicious" individuals, |
| warning them about this or that person calling them over and over again. |
| This could only mean Telia was also systematically monitoring some |
| Swedish hackers and had formed some security group to carry out this |
| probation. Normally this should have been kept quiet, as Telia are |
| absolutely not allowed to form their own abuse police forces, but at |
| some instance they happened to call up a security company using |
| phreakers as informants. Of course this security company didn't like the |
| idea of having "their" phreakers traced around, and the matter was |
| brought to public attention. Many independent sources agreed that Telia |
| had violated the Swedish Computer Act, and hopefully this brought an end |
| to this wild tracing. You shouldn't be too sure though, since Telia |
| themselves never confessed of doing anything illegal. |
|
|
| As you might have understood the Computer Act is quite an important |
| factor in all legal discussions concerning Swedish hacking. This Act |
| came out as a result of general attention focused upon the computers vs. |
| privacy matter in 1973. As Sweden was one of the first countries to make |
| use of computers in governmental administration, and as Swedish |
| authorities were eager to register every possible piece of information, |
| some politically influential individuals started a debate resulting in |
| the founding of the Computer Act and the Computer Inspection Department. |
| As a result Sweden is light years ahead of most countries when it comes |
| to privacy matters. For example there is no problem in having the number |
| identification possibilities on your line deactivated for good, and it |
| won't cost you anything. You can also easily obtain free printouts from |
| any computer register containing information on you, including the |
| register at your local AXE-exchange. |
|
|
| To sum this article up I can draw the conclusion that even Sweden has |
| had its handful of bright hackers, each category bringing their straw to |
| the stack. Even though Swedish officials and companies would hardly |
| admit it, these hackers have obviously been very important for this |
| country, at least in forcing system managers, security officials, |
| software producers, policemen, politicians and so on to think things |
| over. Sweden has also attracted outside attention in some cases, and |
| will probably keep doing so. If you should pin- point one group that has |
| meant more to the Swedish scene than any other, it wouldn't be any of |
| the H/P groups, but rather the cracking pioneers Fairlight - a well |
| organized and world-famous warez producer. |
|
|
| Linus Walleij aka King Fisher / Triad |
| triad@df.lth.se |
|
|
| (Some handles have been changed to protect retired Swedish hackers from |
| luser mail.) |
|
|
| Swedish readers may be interested in the fact that I'm currently writing |
| a lengthy text in Swedish (a book actually) providing a closer look at |
| Swedish hacking history, which will be released on hypertext and ASCII |
| sometime later this year. Over and out from Sweden! |
|
|
| --------------------------------------------------------------------------- |
|
|
| HACKING IN BRAZIL |
| ================= |
|
|
| Before talking about hacking here, it's good to describe the conditions |
| of living. Right now, the country is a mix of Belgium and India. It's |
| possible to find both standards of living without travelling long |
| distances. The Southern part of the country concentrate most of the |
| industry, while in the west one can find Amazonia jungle. There are many |
| Brazils, one could say. |
|
|
| Beginning with the hacking and phreaking. |
|
|
| Hackers and computers enthusiasts have several different places for |
| meeting. When this thing started, by the time of that film "Wargames", |
| the real place to meet hackers and make contacts were the computer |
| shops, game-arcades and "Video-texto" terminals. The computer shops were |
| a meeting place because many of those "hackers" had no computers of |
| their own and the shop-owners would let them play with them as part of |
| a advertising tool to encourage people buying it for their kids. |
|
|
| Today that is no longer needed, since prices dropped down and people |
| make a team already at schools or sometimes just join a BBS (most people |
| who buy a modem, end up thinking about setting up a BBS). By the way, |
| most schools are advertising computer training as part of their |
| curricula, to charge more, and like everywhere, I guess, people no |
| longer learn typewriting, but computer-writing, and many brazilian |
| newspapers dedicate a section on computer knowledge once a week, with |
| advertising, hints, general info and even lists of BBS's. |
|
|
| A few years ago, the "Video-texto" terminals were also big meeting |
| places. That was part of a effort to make popular the use of a |
| computer linked by modem to get services like msx-games, info on |
| weather, check bank account and so on. Just like the Net, one could do |
| e-mail, by some fancy tricks and other things that could be called |
| hacking. The difference was that it was made by the state-owned |
| telephone company and each time the trick was too well know, it was |
| changed. The only way to keep in touch was keeping in touch with the |
| people who used the system like hell. It's no different than what it |
| happens with the computer gurus. The protocol used for that, X-25 is the |
| same used for the banking money transfers, but don't think it was |
| possible to do anything more than checking how much money one had and a |
| few other classified data. People who used that at home (not too many, |
| since the company didn't think it would be such a hit, and didn't |
| provide for it) could spend their fathers money discovering funny things |
| about the system, like messing with other people's phones and so. One |
| could also use the terminals at the Shopping Centers to make phone |
| calls to their friends without paying. The guy at the other end would be |
| heard by the small speaker. |
|
|
| Phreaking here in Brazil is something secret. Apart from the trick |
| described in the section "Letters to read by" at the summer 1994 of the |
| 2600 Magazine, where one would call through locked rotatory telephone, |
| little is known about phreaking. One thing is that people who enrolled |
| in Telecommunications Engineering could call Europe and USA with ease, |
| but they would not tell you how. It must be said that all public phones |
| have metal cables around the cables and that the phone machines are |
| quite tough to break down. I guess it wasn't for beauty. |
|
|
| The phones use some sort of metal coins called fichas, which must be |
| bought somewhere. The trick is to use a coin with a string, so it would |
| not be collected. But if the police caught... The police doesn't follow |
| rules about that. Either they put a fine on the guy for that, or arrest |
| him for vandalism or anything else they think of at the moment. It is |
| hassle, anyway. My friend who was doing electrical Engineering told me |
| that boxing in Brazil was impossible. The system is just not good enough |
| to be boxed. Another friend of mine told me that in the Northeast part, |
| where people are a little bit different and more easy-going, the phone |
| system can be boxed, because some top-brass asked the company to let |
| that feature implemented. The Phone company doesn't admit any knowledge |
| about that. |
|
|
| Internet access is something quite hard to get today. Until a few weeks |
| ago, the system would not let the creation of a Internet site that was |
| not part of some research project. So, only Universities and like were |
| capable of putting people in the Net Universe. In the University of Sco |
| Paulo, people in the post-graduation courses could get it with ease, but |
| graduating students would have to show some connection to a research |
| project. That in theory, because the students found out that one could |
| use the IBM CDC 4360 to telnet without a Internet account. Also, all the |
| faculties that had computer rooms full of AT 386 which where linked by |
| fiber optics to this computer. Another one did the file transfers |
| between the accounts and the computer at the computer rooms and that |
| ftp was also possible without an account, but only to a few sites, like |
| oakland and so. That lasted for about a year, until that thing was |
| fixed in the router, but only at the Politechnik School. Says the legend |
| that the guys were downloading too much GIF and JPG pictures of Top |
| Models from a ftp site nearby. That spent so much bandwidth that the |
| site started to complain and both things happened: the site stopped to |
| store GIF's of wonderful women in swimsuit and the router was fixed to |
| prevent ftp without a Internet account. One can still today connect the |
| outside world via telnet and many people have accounts in Internet BBS |
| like Isca BBS, Cleveland Freenet and like. The Bad Boy BBS was "in", |
| until it went out of business. This kind of access is not good, though, |
| for it is very slow, sometimes. Also, it is hard to download something |
| bigger than 60 kbyte. The way I devised, downloading the file inside |
| the bbs and uuencoding it. This way you could list the file and capture |
| the screen listing, uudecode it after some editing and have a working |
| .exe or .zip file. |
|
|
| By these means one could, inside the Campus, do all downloading one |
| wanted, from anywhere in the world. Outside the campus, it is possible |
| to do it by phone lines, but: the Modem will not go faster than 2400 |
| without character correction (no Zmodem at all). Which makes quite hard |
| to download compressed files. One could an account: that would be |
| possible by these means, but the amount of trash during the phone |
| connection would make it real hard to type in passwords and like. To try |
| doing any kind of thin g but reading letters by modem is some kind of |
| torture. The real thing is to do it by "linha dedicada", a special line |
| for computer transmission. It's much more expensive though, but if you |
| have the money to spend with that... |
|
|
| Perhaps the best way to get access to an Internet account though is to |
| be part of the research project "Escola do Futuro" that among other |
| things get schools linked by the Net. That's what I did and they pay me |
| quite well to search for data in the Net, for the students of those |
| schools. The University of Campinas is said to give all students a |
| Internet account regardless of knowledge of what-it-is, as soon as the |
| guy(girl) gets in. Of course here there's BITNET also. That's doomed for |
| extinction, but this or that reason keeps people from closing it down. |
| Most teachers use it, guess there's even some post-graduation work |
| written about that. It's easier to access via modem, also. Old habits |
| die hard. |
|
|
| Outside the Campus, for common people, there are few opportunities. The |
| only thing you can get, at least until the opening of commercial |
| internet sites, something about to happen one of these days, is access |
| by mail. You join one BBS with Internet access, and your mail is sent by |
| a Internet account later during the day. This is not a direct access, |
| as one can see, but it's a easy way to access by modem. Problem is that |
| you have to pay if you use it too much. The BBS's that do it don't do it |
| for free, also. Connection to the Compuserve is also possible, but it |
| also costs a lot of money, for my point of view. |
|
|
| Because of the newspapers, the knowledge about Internet is spreading |
| fast and the number of sites is growing the same way everywhere else in |
| the world. Even the military people are starting with it. There are plan |
| s to enhance it and make better connections, and some informative |
| material is being translated in Portuguese, like "Zen and the Art of |
| Internet" and made available in the gopher.rnp.br. There are many |
| mirrors from many famous sites, like Simtel20 and at least one Internet |
| BBS, the "Jacare BBS" (Alligator bbs, available by telnetting |
| bbs.secom.ufpa.br - 192.147.210.1 - login bbs. World Wide Web sites are |
| becoming sort of popular also, but still available only to a few people |
| who are lucky enough to get the access. Brazilian hackers are not very |
| fond of sharing the knowledge of how to get access and other things, |
| sometimes because of fear of losing it, sometimes because the greed of |
| it would overcharge the system. There's no hacker magazine here, yet, |
| and very few people confess their curiosity about hacking for knowledge |
| for fear of not finding jobs. Anyway most would-be hackers either get a |
| job and stop hacking for fun or keep their activities secret in order to |
| pursue their objectives. |
|
|
| Today, Brazilian Hacker Underground did change a little. Lots of |
| magazines, dealing only with Internet Issues, are being published. There |
| is a hacker zine, the now famous "Barata Eletrica". This and the hacker |
| list I created is starting to unite the computer rats, here. But I had |
| to stop hacking in order to write the e-zine. Too famous to do that. |
| Another guy just started the thing. He did not learn with my mistake and |
| is signing it with his name, also. Received lots of letters, even as far |
| as Mozambique, praising the material, which is very soft, for fear of |
| losing my net access. Twice my account was "freezed". The people at my |
| site are paranoid. Suffered too much from break-ins already. Most BBS's |
| are trying to turn themselves in Internet providers or else, to get |
| e-mail access. There was a fear the State would control the thing, like |
| they did with the Phone system. Can any of you guys imagine what it is, |
| to pay 4.000 US$ dollars for a phone line? In the City of Sao Paulo, |
| (look like L.A., one can say), that's the average price. Cellular is |
| cheaper. Motorola rules. The public phone system was changed again. No |
| more "fichas". At least for long distance calls. It's a small card that |
| looks like plastic one side and magnetic material in the other. m still |
| trying to do 2600 meetings. Oh, once in a while, there is a break-in |
| here and there, and a hacker is interviewed in TV, but people are only |
| now making the difference between the good guys (hackers) and the bad |
| guys (crackers). With Win95, people are losing fear of exchanging |
| virus-sources files. The lack of philes in Portuguese makes it dificult |
| for people to learn about hacking. People who know about it, don't have |
| enough time to write. I started to unite some guys to do a translation |
| of "hacker crackdown", but that's another story. I shortened the name of |
| the book to "crack.gz". Guess what's happened? My account is blocked up |
| to this day. They told me I'll get my access back. One of these days. |
| One of these days I'll re-write this article, and tell the whole thing |
| in detail. |
|
|
| Any Portuguese speaker that does not know about my e-zine, |
| try a ftp.eff.org mirror. The URL: |
| ftp://ftp.eff.org/pub/Publications/CuD/Barata_Eletrica |
|
|
|
|