textfiles/groups/CDC/dead_cow.txt

1080 lines
33 KiB
Plaintext
Raw Permalink Normal View History

2021-04-15 11:31:59 -07:00
BBC Panorama
Interview with Deth Veggie and Sir Dystic of the Cult of the Dead Cow
CORBIN
Deth Veggie, what is the Cult of the Dead
Cow?
DETH VEGGIE
The Cult of the Dead Cow started out back in
the early 80s as initially the republished
text files. Actually the first e-zines as
now they're called, and although we were
involved with the computer underground we
weren't the same as other hackers. It sort
of evolved to the point where it is today
where it's still today our primary focus
isn't necessarily technical. We have a lot
of like social aims, social activity, but we
also have.. there's the technical aspect.
CORBIN
What's the philosophy of Cult of the Dead
Cow?
DETH VEGGIE
Well one of our primary functions is, is we
try to bring information to people that they
normally wouldn't ever see from other
channels. We publish a lot of text files, a
lot of them are not at all technical but not
anything that you're likely to find from
other sources. We basically like to
challenge people's thought ideas and make
them think in new ways.
CORBIN
And hacking, what's the appeal?
DETH VEGGIE
well I mean if you consider hacking to be the
manipulation of a system to make it do
something, you know, basically you can hack
anything. It doesn't have to apply
specifically to computers. You can hack
electronics, media, information, there's
social hacking, and basically it's a certain
amount of power. I mean you can make
something do something that it wasn't
intended to do.
CORBIN
And that's the appeal of it?
DETH VEGGIE
It's certainly part of the appeal. It's the
modern exploration you know.
SIR DYSTIC
I think for me I consider a hacker to be
anyone who takes something apart and puts it
back together better, and currently it seems
like the output, the aspect that it takes is
computer hacking but historically there's
always been people with that sort of mindset
or attitude, we can start like people who I
consider to be of the hacker mindset like
Benjamin Franklin or Aristotle, people like
that, you know, they basically did things
their own way.
CORBIN
Okay, you've obviously explained that hacking
can apply to different fields and not just
computers, but obviously computers is what
we're talking about here today, and Sir
Dystic you know when you go on line, when you
hack, for want of a better word, that's the
word we're using, what do you feel? I mean
what do you get out of it? What's the appeal
of it?
SIR DYSTIC
Well like I said, it's a form of exploration.
You're trying to, you know, you're exploring
ideas or computer systems rather than you
know, geographical land, but it's still the
idea of being able to go into something and
find new things that nobody else has
discovered yet before in the sense of hacking
being breaking into computers certainly a lot
of people do it because they're going into
places that they wouldn't normally be
allowed.
CORBIN
And the world at large finds it frightening
the idea of people hacking into their
systems?
SIR DYSTIC
People are frightened by pretty much anybody
who can do something that they can't and they
don't understand.
DETH VEGGIE
I also think that it's important to see that
the danger isn't from hackers in terms of
kids. The danger in terms of computer
security are from aspects like organised
crime or espionage, things like that. The
danger is not from hackers like Sir Dystic or
myself, or even just other kids out there.
CORBIN
You showed the way?
DETH VEGGIE
The way was already out there. The people
already were aware of it. Another thing
about hackers is that they don't create the
whole, security holes, they basically just
find them and exploit them.
SIR DYSTIC
Discover them. They discover them.
CORBIN So would you disclaim all responsibility that
you put your tools out there and let people
use them?
SIR DYSTIC
People use our tools for all sorts of things
and I mean people can use any product in the
way it's not prescribed and that in many
cases is illegal and certainly using a
programme like Back Orifice to break into a
computer would be illegal, but in truth it's
really not even a programme to break into
computers, it's really once a computer has
been compromised it allows you to control
that computer completely.
CORBIN
Well let's talk about Back Orifice. Sir
Dystic why did you write this programme Back
Orifice?
SIR DYSTIC
That work it essentially came out of.. it was
a small simple tool I was writing and then
when I realised the possibilities of how far
it could be taken, I basically just added
every feature to it I could think of and we
tried to point out to the world that this
really one of the easiest ways that your
computer can be compromised and when that
happens there's basically no limit to what a
remote attacker can do. All it takes is
basically coating it, and what I was trying
to show is that it really doesn't even take
all that much effort to code that and it's a
very small, simple programme and it works
very efficiently.
CORBIN
So you're saying you wrote it to show up the
faults in the system.
SIR DYSTIC
Sure. I mean my main issue at the time was
with Windows 95 which was essentially
released without any security built into it.
It had very, very, minimal security and that
was a marketing decision by Microsoft, they
wanted to have as many people be able to use
it as possible. But by sacrificing security
it's no longer a secure platform. It's
certainly not anything that people should be
doing things like online commerce and online
banking from but they are marketing it for
that purpose.
CORBIN
But they would say that the fact you wrote
this software is very malicious to show up
the faults in the thing.
SIR DYSTIC
It's malicious to for instance show that
there's a faulty seat belt in a car? I don't
understand how that's malicious.
DETH VEGGIE
I think it's also.. the point is that there
are already things like that out there. In
fact when we released Back Orifice all these
people came out of the woodwork and went like
"hey I had something that did this exact same
thing months ago." And because nobody had
announced it publicly, nobody was protected
against it. Nobody knew that hey, you know,
when I'm using my credit card to buy shoes on
line, somebody could be capturing that credit
card information. Nobody knew that their
computer was open to basically anybody who
wanted to take a look at it.
CORBIN
But surely when you create something as
powerful as Back Orifice that could have such
an evil purpose in the wrong hands, that's
very irresponsible.
DETH VEGGIE
What I was going to say is that when we
released it we consciously made several
decisions. We made limitations as far as it
would go because we didn't want it to be
abused too much, like things like not making
it viral in that it wouldn't reproduce
itself, and not making it polymorphic, things
like that.
CORBIN
It wouldn't change itself?
DETH VEGGIE
So it wouldn't be impossible to control.
SIR DYSTIC
But basically I mean the anti-virus' response
to it was they started scanning for the Back
Orifice programme. One of the interesting
things was at that time they also started
scanning for a bunch of other similar types
of applications, many of which had been
around for six months to a year, but they had
never bothered to scan for those programmes
because nobody was talking about it, nobody
was making an issue. If we'd wanted to be
malicious about it, we wouldn't have made as
much noise about it as we could. We tried to
get as much media about it as possible
because by raising the awareness of the issue
is the only way that anything is going to get
done about it. If we'd wanted to be
malicious we would never have told anybody
about it and we'd be out there exploiting
people successfully because.
CORBIN
Yes, but aren't people using your programme
in a malicious way? Isn't that the end
result of what you've done?
DETH VEGGIE
I think when we released it we were very -
this may have been kind of idealistic of us
but I know that I personally, I hoped and I
really believed that by releasing something
that was this powerful, Microsoft in this
case, would be forced to fix the fundamental
problems. The fundamental vulnerabilities,
whether or not someone is using a programme
to exploit them, are still there and that's a
problem. I mean I use Windows computers.
Most of the world.. you know, single most
popular operating system, and it's pretty
scary that there is no security inherent and
we hoped that we'd be able to force them to
fix that. Unfortunately the response turned
out to be basically spin control from the
marketing department.
CORBIN
What about Microsoft's response to your
product?
DETH VEGGIE
They basically buried their head in the sand
and said that it wasn't at all a problem and
they put out a couple of press releases going
point by point talking about issues and our
response at the time was to go through and do
a point by point response, showing how each
of their responses was either misleading or
simply untrue, or many of them at least,
certainly not all of them. And you know we
really didn't even like make that much of a
big deal of it after that, but within a
matter of months Back Orifice had become so
widespread that you could pretty much check
any sub net in the world and find it on one
or two machines.
CORBIN
But surely that's the point. You created it
and you say you wanted to show up the flaws
in the system. But other people out there
went and used it for nefarious, malicious
purposes.
SIR DYSTIC
The fact that it was on those machines
doesn't actually mean that it's being used
for malicious purposes. In fact huge numbers
of people actually mistakenly infected
themselves because they heard on the media,
and this was something I totally didn't
expect to happen, they heard about Back
Orifice in the media, they went to our
website and downloaded it, not looking at the
documentation at all they went and ran every
single programme, and one of those programmes
of course is the programme which runs the
server on your computer.
CORBIN
But surely it shows the dangers of creating
such a powerful tool which, in the wrong
hands, can really be out of control?
SIR DYSTIC
Certainly but it's not really any different
than any other remote administration system.
Somebody has Microsoft, someone wrote
administration system installed on their
computer and their computer's been
compromised. You can control the system
remotely through that. Ours is just
incredibly small, efficient and has a lot of
functionality.
DETH VEGGIE
I think that we took some of that into
consideration when we were designing B02K the
second version, for instance since we made it
so that it didn't have a default port and
password so people couldn't accidentally
install it and they actually had to set it up
to things. But in my view I think that the
ultimate responsibility for these problems
lies not with us for pointing them out but
with the people who created a fundamentally
flawed product in the first place. It's no
more the responsibility for people dying in
Ford Pintos was not Ralph Nader saying hey
look you've run into a Ford Pinto from behind
it explodes, it was Ford's responsibility for
building something that exploded when you ran
into it.
SIR DYSTIC
But more importantly than even really forcing
Microsoft to fix the problem, which obviously
they're not going to do because that would
require essentially abandoning one of their
entire platforms, it's more important that
people are aware that these are issues.
People who get their computer and go on line
first day, it probably never occurred to them
that it's even possible for their computer to
be taken over remotely. But the fact that BO
was so widespread and got so much media
attention has made so many people aware that
that's a possibility and maybe their decision
was okay I'm not going to do on line
commerce, or I'm not going to do my home
banking. Or maybe their decision was I'm not
going to use Windows 95 because it obviously
has these problems. But it's really just
important that people are aware of the actual
issues -
DETH VEGGIE
So that they can make and educated decision.
SIR DYSTIC
Exactly, as opposed to a decision based on
Microsoft's marketing.
CORBIN
I mean you've outlined your reasons for doing
it very clearly, but I have to say to you
that most people out there just think that
these guys shouldn't be doing this kind of
thing.
SIR DYSTIC
We don't think the same way as most people.
We know that.
CORBIN
Deth Veggie?
DETH VEGGIE
I actually believe that anyone who thinks
that way just really doesn't understand the
situation.
SIR DYSTIC
I'll give you an example. After I released
it I received hundreds and hundreds of emails
from various different people and I received
emails from people who had had their
computers taken over, and not a single one of
them blamed me for it. Not a single one of
them was mad at me, and every single one of
them said the same thing to finish which was
"I'll never let this happen again".
CORBIN
Aren't you afraid that law enforcement is
going to be on your back at some point over
all of this?
DETH VEGGIE
We've done nothing illegal. We've talked to
law enforcement. They're not happy about it
but I don't think they are holding a grudge
against me for it certainly.
CORBIN
What about Microsoft, how do they feel about
it?
DETH VEGGIE
Which part of Microsoft, their marketing
department, their programmers, Bill Gates
himself? I mean everybody is going to have
their own opinion and certainly anybody in
marketing is not going to like any negative
publicity, certainly people who are the
technical nature I would hope at least
appreciate the work that went into the
product. I mean everybody is going to have
their own opinion. I don't expect Microsoft
to like it but I do expect them to at least
admit that these are real issues and answer
to them.
CORBIN
Talking about law enforcement, moving on from
Back Orifice specifically but to the whole
sort of hacker area, it seems, particularly
in America, that people are getting more
serious about pursuing people that they
believe have compromised computers or broken
in in an unauthorised way. I mean how do you
feel about the way that the law if beginning
to treat this?
DETH VEGGIE
I don't have a problem with pursuing people
who have actually broken into computers. I
think that my opinion is that when someone
goes into a computer and damages a system,
destroys data, things like that, they stop
being a hacker and they become a criminal,
and at that point more power to law
enforcement. If they're going in and
destroying things then they should be
punished.
SIR DYSTIC
One distinction I'd like to make though is
that I don't think most people who I would
consider hackers do any type of hacking for
personal gain. They do it for exploration
purposes, information purposes, but they're
not out there stealing money from people.
Those are the organised crime people. Those
are people who are thieves anyway and happen
to have picked up the technical knowledge to
steal stuff in any way.
CORBIN
But people don't like the fact that people
are breaking in to their computers. They see
it as their own personal domain, even if
those people aren't stealing anything it's
felt to be an invasion of privacy.
SIR DYSTIC
Invasion of privacy, absolutely, but still,
one of the other issues is that people who
are getting caught for what I consider to be
essentially victimless crimes, breaking into
a computer, looking around, not stealing
anything, not deleting anything, are getting
sentenced to completely unreasonable
sentences because they're being made examples
of because the chances of actually catching
and prosecuting somebody completely for these
types of crimes happens so rarely that when
it does happen they want to make and example
of them.
DETH VEGGIE
It's not just that, it's that a lot of times
in the case it'll be like sort of an
arbitrary monetary damage - okay he caused X
millions of dollars worth of damage, and then
it turns out that the person actually didn't
do any damage. What they're doing is okay,
that was the cost to go in and patch the
holes. The problem with that is that this
person did not create those holes. They're
not responsible for those holes. All they
did was enter through holes that are already
there, and whether or not that person came in
and exploited them, somebody else could have
been doing it, it could have been someone
coming in to do actual damage.
CORBIN
Do you think that law enforcement is getting
the right people when it arrests those that
it believes are responsible?
DETH VEGGIE
It's just like any other activity. Sometimes
they get the right person and sometimes they
don't.
SIR DYSTIC
I think that with the cases that they tend to
go after tend to be the cases that got the
most media attention, and the cases that got
the most media attention are usually not
malicious or particularly ingenious hacks.
They're -
DETH VEGGIE
Web page hacks.
SIR DYSTIC
Web page hacks, a lot of this service stuff.
Those aren't dangerous things. That's not
somebody stealing millions of dollars from a
bank which is what you really need to worry
about.
DETH VEGGIE
Well I kind of disagree. Denial of Service
attacks can be like very malicious and very
dangerous.
CORBIN
Well of course we've seen some this year,
haven't we, in February, a great rash of
them. Now again there were tools out there
that people took advantage of. I mean did
you see that coming up? Was that on the
horizon?
DETH VEGGIE
Absolutely.
SIR DYSTIC
I'd been saying that exactly that was going
to happen for years and years. In fact two
days before the denial of service attacks I
did an interview with a TV station and talked
about specifically that, about how in the
underground there are people who are
collecting lists of ownable and exploitable
machines which to be used for some unknown
purpose in the future, and that's very
exactly what happened. But the attacks we've
seen so far have been very, very low tech and
very reserved and not particularly successful
in my opinion.
CORBIN
What could happen though?
SIR DYSTIC
What could happen? I think a worst case
scenario would be like a programme for
Windows which was by virusidic and wormed
itself, that means it copies itself to other
automatically hacked into other computers and
if that programme were designed to attack a
specific website or something it would be so
widespread that there would be really little
that they could do without actually cutting
off access to their legitimate customers
because they wouldn't be able to distinguish
between the attacking machines and legitimate
customers. All they would see was huge
amounts of traffic that are overloading their
servers.
DETH VEGGIE
A competent security person could basically
shut down the internet. I mean it is
completely technically possible, and the fact
that it had..
CORBIN
Break down completely?
SIR DYSTIC
Yes, there are fundamental flaws in the
internet.
DETH VEGGIE
- in the protocol that the internet uses, the
internet protocol, IP, there's fundamental
problems with it that if somebody who knew
what they were doing could make the internet
unusable for a large amount of time.
SIR DYSTIC
There's another of the CDC members, Mudge,
actually was testifying before the US Senate,
was it last year - two years ago and said the
same thing in front of the US Senate that if
he or any of the other people that knew this
sort of thing were inclined, they could take
down the entire internet and that needs to
be, you know, those are serious
vulnerabilities that need to be taken care
of.
DETH VEGGIE
But keep in mind that the people who have
that level of ability is the very, very tip
of the pyramid. It's an incredibly small
number of people and those people have that
ability because they have worked with
computers and security for years and years
and years, and in that time they get over the
whole.. you know, oh boy I'm breaking into
somebody's computer and I'm going to go
change their wallpaper. You get over that
really quickly in the first several months.
SIR DYSTIC
That's really big when you're a 13 year old,
but..
CORBIN
You're saying that when you get older ethics
creep in and you do actually do the right
thing?
DETH VEGGIE
Yes, when you're a 13 year old kid it's the
Beavers and Butthead syndrome, you know, you
mess stuff up, whereas as you get older and
you mature, you develop a sense of ethics, of
right and wrong etc.
CORBIN
But surely the danger is that if the internet
is that vulnerable, and there are some people
who can wreak havoc that someone could pay
them a great deal of money or..
DETH VEGGIE
Absolutely.
SIR DYSTIC
Absolutely which is why we spend so much
effort trying to point out these problems to
people and hoping that.. I mean we can't
solve the problems. We can offer solutions
but nobody has to listen to us. All we can
do is raise the awareness of the issues and
hope that people care enough to make them be
fixed.
DETH VEGGIE
It's like with the denial of service things,
as Sir Dystic said. That's something that
we've been talking about for years, not just
us but people from the hacker community,
people from the computer security industry
had been saying for years like hey, look,
this is a real danger. And then, but then
all of a sudden it happens and people act
like really surprised like on my God, how did
this happen, it's like well, we've been
telling you.
SIR DYSTIC
And like I said..
DETH VEGGIE
I was surprised it hadn't happened earlier.
SIR DYSTIC
Exactly, and I'm also surprised that it was
that badly executed.
DETH VEGGIE
Yes, that it was that easy to set up. I
think that the first couple of them were well
executed. I think that the vast majority of
the ones that we saw were copy cat attacks.
SIR DYSTIC
True.
DETH VEGGIE
And those were the ones that were just kind
of sloppy.
CORBIN
So what's the answer then, to stop these kind
of attacks, to bring some kind of security?
DETH VEGGIE
To stop which kind of attacks?
CORBIN
Well some of the scenarios that you've
outlined, whether it be denial of service or
of organised crime gangs, getting hold of
people. I mean what is your message to
people?
DETH VEGGIE
There's a technical solution and there's a
social solution. The technical solution is
obviously find every hole and fix it and
that's never going to happen because there's
always going to be other problems. The
social solution is to make people aware of
the dangers that go with being on the
internet and hope that they can use their own
intelligence to protect themselves some way,
and granted if all that requires is running
some product that some company has provided
that actually protects you, that'd be great,
but there's no one product that actually
provides you any great amount of protection
so far.
SIR DYSTIC
Well there's varying amounts of protection.
DETH VEGGIE
What exactly?
CORBIN
What about laws because Congress is looking
at various bills to strengthen the law. Is
that the answer?
DETH VEGGIE
It's not the answer. I think the problem
with that is that it's all after the fact.
I mean you can legislate the heck out of
something but it's not going to stop people
from doing things beforehand. It's not going
to make it harder for them to do it. It just
means that okay if they do it they'll be
punished.
SIR DYSTIC
And we know that punishment is definitely a
deterrent, right?
DETH VEGGIE
Yes, I mean with the development of money
instead of the idea of putting money into
bank vaults they just left the money in paper
bags on the street and just said well if you
take that money you'll be in really big
trouble. You know, it's important to do
both. But some of the laws that are being
looked at right now are actually
counterproductive. Like.. what's the name of
the law.. the thing that's being..?
DETH VEGGIE
The reverse engineering thing?
SIR DYSTIC
Yes, the reverse engineering thing. If you
hold on for a second I can find out what's..
CORBIN
No, I know what you mean, yes. What's the
dangers of that?
DETH VEGGIE
Well because that basically prevents people
from looking at something and seeing if
there's problems, but the criminals, the
people who you should worry about, they don't
care if it's illegal to break into systems,
so if they're planning on doing that, then
why would they care if it's illegal to
backwards engineer it.
SIR DYSTIC
It's basically trying to make it security
through obscurity.
DETH VEGGIE
If we make it illegal for people to analyse
this stuff, to find bugs in it, then people
won't find bugs in it which is just not true.
CORBIN You're painting a pretty dark picture of all
of this. Is that the way you think we're
going?
DETH VEGGIE
Of which?
CORBIN
Of the general vulnerabilities, the dangers.
SIR DYSTIC
You know the internet is a very dangerous
place to be and it's being marketed right now
as being this neat toy that everybody should
come play with, and you know, get online
today, and you don't get any warning when you
log online. You don't get a warning that
says look, you are opening yourself up to
these possible ways of being exploited. So
it is, in my opinion, a dark situation and
like I said, I think that the only way to
deal with it is use your education, you know.
DETH VEGGIE
I think you're a little more pessimistic than
I am. I think that the internet, although I
think it's tremendously powerful, like
tremendous..
SIR DYSTIC
Potential?
DETH VEGGIE
Well, I mean it's a very powerful took and
the potential there is for it to either go to
very dark future or to a very positive one,
it just totally depends on how and what
happens now as to what.. you know, what it
will develop into.
CORBIN
Why did you create Back Orifice and release
it?
SIR DYSTIC
I released Back Orifice to point out the
risks that people are putting themselves at
by using various operating systems which were
essentially created with no security built
into them.
CORBIN
Which one?
SIR DYSTIC
Well specifically Windows 95 is what the
original Back Orifice ran on. Windows 95,
from what I understand, Microsoft actually
took in marketing survey when they were
preparing to create it where they itemised or
asked people how much they valued each of the
different features that they wanted to be
into the product and security was somewhere
around 24, and of course any time you put
security into something you sacrifice
usability. Every time you have to log into
something or whatever, you have to.. it makes
it that much.. or in Microsoft's opinion more
difficult to use, or more annoying or
whatever, so they do things like save your
passwords for you which completely defeats
the point of having a password, things like
that, and again it was just a marketing
decision. They want to market it to six year
olds and grandmothers and they don't want to
have to deal with.. you know, access control
lists and other, you know, big security words
that they don't understand.
DETH VEGGIE
I think fundamentally there's security, be it
computer security or physical security is
always at odds with convenience.
SIR DYSTIC
Oh absolutely.
DETH VEGGIE
The analogy that I always use is that it
would be really nice if you didn't need a key
to start up your car, but that's not the way
the world works. That's not reality.
CORBIN
That's what you need.
DETH VEGGIE
Kind of an interesting analogy to that with
like for instance saving passwords, catching
passwords is like well we need a key to start
the car but we'll leave the key in the car.
CORBIN
That's what you think Microsoft does.
DETH VEGGIE
The problem is there's so much encasing
passwords, the problem is encasing passwords
that anybody can read.
CORBIN
So you say you released Back Orifice to show
up the shortcomings and the security of
Microsoft systems, but most people say it's
just a really malicious thing to do, and
dangerous.
DETH VEGGIE
Well if they heard about it then I
accomplished my goal which was to make people
aware of these problems.
CORBIN
Yes but it's still out there and people can
use it against other people in a pretty
unpleasant way.
SIR DYSTIC
WellBack Orifice is scanned for in all the
major anti-virus software, so the only people
who I guess would technically be at risk to
it at this point would be people who didn't
even bother to run a virus scanner, and
they're going to be vulnerable to gazillion
different things that are equally if not more
dangerous.
CORBIN
What about ordinary people though, who might
not know about that?
SIR DYSTIC
That's whose awareness I'm trying to
increase. I'm trying to make ordinary people
aware of these issues.
DETH VEGGIE
The problem is, is if we'd just started, you
know, there wouldn't really be any way for us
to publicise the fact of these
vulnerabilities, I mean we could have gone on
the street corner and started yelling but
then they'd just throw us in jail because
we're crazy. I think there's pretty limited
amount of things you can do to actually be
heard.
CORBIN
But how do you feel when you know that there
are people out there whose machines have been
infected as it were, with the software?
DETH VEGGIE
If they're actually being exploited I feel
terrible. I mean I think that's really bad.
I don't feel responsible. I think that the
responsibility ultimately lies with the
people who actually are responsible for these
problems which, in this case, would be
Microsoft.
CORBIN
Yes, but you created it and put it out there.
Surely you must bear responsibility or some
responsibility.
DETH VEGGIE
I don't feel responsible. I've actually
thought about this a lot. Like I said, I
feel really bad about it, but I think that
what Microsoft is doing, the analogy that I
use is that basically handing out loaded guns
to school children and what we're doing is
saying hey, that's really, really dangerous,
and...
SIR DYSTIC
We're pointing out to the kids that if you
pull that trigger you can get hurt. Probably
a lot of those kids are going to pull the
trigger immediately but.. you know, that
happens. (laughter)
CORBIN
Sir Dystic why is the internet so vulnerable?
In a nutshell.
SIR DYSTIC
Because it all is essentially using
technology which was designed 20 plus years
ago that was not designed for this type of
use at all. It was for small, private,
academic and research originally and it's
using the exact same protocol since day one.
There were these fundamental problems in that
protocol when it was designed and because
everybody is using that protocol now, it's
going to take a huge amount of effort to get
everybody to switch to a new protocol that
doesn't...
DETH VEGGIE
They're working on it.
SIR DYSTIC
Oh yes, sure.
DETH VEGGIE
But I think another problem isn't just the
age, it's the fact that because it wasn't
designed for this, sort of hobble along doing
this, it was hacked and patched together by a
million people over the past 25-30 years,
able to make it possible to function in the
way that it does.
CORBIN
So it was sort of added to in little
exponentially bits and pieces.
SIR DYSTIC
Exactly, by lots of different people.
CORBIN
Rather than a whole system being designed.
SIR DYSTIC
Exactly, and I mean that's a very sort of
like over simplification but you don't want
me to get very technical about it.
CORBIN
Sir Dystic, why don't you go and work for
Corporate America, you could make a fortune
with your skills.
SIR DYSTIC
What makes you think I don't?
CORBIN Deth Veggie, why don't you go and work for
Corporate America?
DETH VEGGIE
We all have day jobs, but that's separate,
you know, and a lot of us actually work in
the computer security industry doing what we
can to make computers and systems more
secure.
CORBIN
Okay. So do you?
SIR DYSTIC
I work in the computer industry but I don't
actually do security. I write software for a
living and I do it in my spare time.
CORBIN Okay. Thank you.
(End of Interview)