874 lines
41 KiB
Plaintext
874 lines
41 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 3, Issue #3.16 (May 9, 1991) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
||
GAELIC GURU: Brendan Kehoe
|
||
|
||
+++++ +++++ +++++ +++++ +++++
|
||
|
||
CONTENTS THIS ISSUE:
|
||
File 1: Moderator's Corner
|
||
File 2: Is Prodigy snooping thru your hard disk?
|
||
File 3: Prodigy under Fire
|
||
File 4: Comp.Org.Eff.Talk. comments on Prodigy FYI
|
||
File 5: Prodigy's Response to Stage.dat File
|
||
File 6: A Few Observation on Prodigy
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
||
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
||
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
|
||
(2) cudarch@chsun1.uchicago.edu;
|
||
(3) dagon.acc.stolaf.edu (130.71.192.18).
|
||
E-mail server: archive-server@chsun1.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission. It is assumed
|
||
that non-personal mail to the moderators may be reprinted unless
|
||
otherwise specified. Readers are encouraged to submit reasoned
|
||
articles relating to the Computer Underground. Articles are preferred
|
||
to short responses. Please avoid quoting previous posts unless
|
||
absolutely necessary.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Contributors assume all
|
||
responsibility for assuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Moderators
|
||
Subject: Moderator's Corner
|
||
Date: May 9, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.16: File 1 of 6: Moderators Corner ***
|
||
********************************************************************
|
||
|
||
++++++++++++
|
||
Newmail Problems
|
||
++++++++++++
|
||
|
||
There appear to be mailer problems somewhere along the lines. CuD
|
||
3.13 was re-sent because of some garbling problems; CuD 3.14 went out
|
||
of NIU with no problem and we received few bounces, but apparently
|
||
that issue was gobbled up and only a few received it. A significant
|
||
number of 3.15s were returned because they could not sneak through a
|
||
particular gateway. If you are not receiving CuD within a few days of
|
||
the pub date in the header, let us know.
|
||
|
||
+++++++++++++
|
||
CuD's Old News
|
||
+++++++++++++
|
||
|
||
We are occasionally asked why we print "old news" that has been
|
||
circulated on the nets for awhile. A recent Usenet survey of all
|
||
newsgroup use estimates that CuD reaches about 9,300 through usenet.
|
||
Relatively few sites (210) make CuD available to their users, so the
|
||
readers-per-site matches that of more-established on-line journals
|
||
such as RISKS and our progenitor TELECOM-DIGEST. In addition to a
|
||
mailing list of about 700, we immediately reach about 10,000 with each
|
||
posting. However, we have about 30 additional non-usenet feeds, and
|
||
other readers obtain CuD from GEnie, Compuserve, and hundreds of BBSs,
|
||
including two of the largest in the country (PC-EXEC and AV-SYNC). We
|
||
also send out various back issues to about a dozen people each month
|
||
who do not subscribe but simply want specific information. This means
|
||
that, for perhaps one third of the readers, CuD may be the only source
|
||
of news, so what is "old" to most of us fills in gaps for others. We
|
||
try to assure that those without net access are provided with the
|
||
basics of stories covered in other digests (thus our policy of
|
||
reprinting old material) and hard-copy media. Further, some of the
|
||
posts we print are sent to several other outlets simultaneously, and
|
||
sometimes hold these for a week or two prior to publishing. For those
|
||
who find these stories stale, we apologize, but the feedback from
|
||
those who are, believe it or not, only now hearing about Sun Devil
|
||
indicates that, for better or worse, some dated coverage is necessary.
|
||
So, thanks for not complaining too much.
|
||
|
||
+++++++++++
|
||
Prodigy
|
||
+++++++++++
|
||
|
||
This issue focuses on the problems of Prodigy. As most know by now,
|
||
Prodigy was criticized last year for apparent censorship and what some
|
||
felt was high-handed treatment of customers complaining first about
|
||
Prodigy's billing practices, and next about Prodigy's response to
|
||
those who complained to other Prodigy users through E-mail. Another
|
||
problem has arisen. It seems that Prodigy's user-interface, Stage.dat,
|
||
appears to include bits of private data from users' other files.
|
||
Thanks to all those who have sent us material. We have selected the
|
||
most comprehensive to summarize the current brouhaha.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: The Moderators' <72307.1502@COMPUSERVE.COM>
|
||
Subject: Is Prodigy snooping thru your hard disk?
|
||
Date: 02 May 91 20:49:57 EDT
|
||
|
||
********************************************************************
|
||
*** CuD #3.16: File 2 of 6: Is Prodigy Snooping? ***
|
||
********************************************************************
|
||
|
||
We recently received the following summary of an article that appeared
|
||
in the May 1, 1991 issue of the Wall Street Journal. No further
|
||
citation was given. As automated access programs become more popular
|
||
(eg: Compuserve's CIM and GEnie's Aladdin) this issue will become even
|
||
more worrisome. Not only could your email be compromised, but it is
|
||
possible that such programs could inventory your hard drive, reporting
|
||
which applications you have installed, and their serial numbers.
|
||
Would an organization, such as the SPA, sponsor such a program? Alas
|
||
there appears to be little (if anything) that would prevent them from
|
||
doing so.
|
||
++++++++++++++++++++++++++++++++++++++
|
||
|
||
Subscribers to the popular Prodigy computer service are discovering an
|
||
unsettling quirk about the system: It offers Prodigy's headquarters a
|
||
peek into users' own private computer files. The quirk sends copies
|
||
of random snippets of a PC's contents into some special files in the
|
||
software Prodigy subscribers use to access the system. Those files
|
||
are also accessible to Prodigy's central computers, which connect to
|
||
users' PCs via phone lines. The service's officials say they're aware
|
||
of the software fluke. [ We'd use a stronger word than 'fluke' here,
|
||
but we don't write for the WSJ - CuD ] They also confirm that it
|
||
could conceivably allow Prodigy employees to view those stray snippets
|
||
of private files that creep into the Prodigy software. But they
|
||
insist that Prodigy has never looked at those snippets and hasn't any
|
||
intention of ever doing so. "We couldn't get to that information
|
||
without a lot of work, and we haven't any interest in getting there,"
|
||
says Brian Ek, a Prodigy spokesman. Nevertheless, news of the odd
|
||
security breach has been stirring alarm among Prodigy users. Many
|
||
have been nervously checking their Prodigy software to see what
|
||
snippets have crept into it, finding such sensitive data as
|
||
lawyer-client notes, private phone-lists, and accountants' tax files.
|
||
Even though Prodigy users' privacy doesn't appear to have been
|
||
invaded, the software problem points up the security risks that can
|
||
arise as the nation races to build vast networks linking PCs via
|
||
telephone lines.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Anonymous
|
||
Subject: Prodigy under Fire
|
||
Date: Thu, 9 May 91 01:22:52 CDT
|
||
|
||
********************************************************************
|
||
*** CuD #3.16: File 3 of 6: Prodigy under Fire ***
|
||
********************************************************************
|
||
|
||
********************************************************************
|
||
********************************************************************
|
||
|
||
News of the Earth Global news and information
|
||
* from electronic and print sources
|
||
supplements * * edited by
|
||
* Regina P Knight, Geert K Marien
|
||
ISSN 1052-2239 and John B Harlan
|
||
|
||
********************************************************************
|
||
|
||
Subject: Prodigy
|
||
Contributed by: Donna B Harlan
|
||
Harlan@IUBACS / Harlan@UCS.Indiana.Edu
|
||
|
||
News source: Help-Net (BITNET/CREN/Internet Help Resource)
|
||
on ListServ@TempleVM
|
||
Date: Thu, 2 May 91 12:31:52 CST
|
||
Original title: Prodigy
|
||
and author: Suzana Lisanti <LISANTI@MITVMA.BITNET>
|
||
Notes: This was forwarded from Help-Net to Roots-L
|
||
(Genealogy List) on ListServ@NDSUVM1
|
||
|
||
|
||
***** Start of forwarded material *****
|
||
|
||
----------------------------Original message------------------------
|
||
I'm forwarding this message regarding Prodigy... I have no idea
|
||
if it's true or not...
|
||
------------------ Beginning of forwarded message -----------------
|
||
The L. A. County District Attorney is formally investigating
|
||
PRODIGY for deceptive trade practices. I have spoken with the
|
||
investigator assigned (who called me just this morning, February 22,
|
||
1991).
|
||
|
||
We are free to announce the fact of the investigation. Anyone can
|
||
file a complaint. From anywhere.
|
||
|
||
The address is:
|
||
|
||
District Attorney's Office
|
||
Department of Consumer Protection
|
||
Attn: RICH GOLDSTEIN, Investigator
|
||
Hall of Records Room 540
|
||
320 West Temple Street
|
||
Los Angeles, CA 90012
|
||
|
||
Rich doesn't want phone calls, he wants simple written statements
|
||
and copies (no originals) of any relevant documents attached. He
|
||
will call the individuals as needed, he doesn't want his phone
|
||
ringing off the hook, but you may call him if it is urgent at 1-213-
|
||
974-3981.
|
||
|
||
PLEASE READ THIS SECTION EXTRA CAREFULLY. YOU NEED NOT BE IN
|
||
CALIFORNIA TO FILE!!
|
||
|
||
If any of us "locals" want to discuss this, call me at the
|
||
Office Numbers: (818) 989-2434; (213) 874-4044. Remember, the next
|
||
time you pay your property taxes, this is what you are supposed to
|
||
be getting ... service. Flat rate? [laugh] BTW, THE COUNTY IS
|
||
REPRESENTING THE STATE OF CALIFORNIA. This ISN'T limited to L. A.
|
||
County and complaints are welcome from ANYWHERE in the Country or
|
||
the world. The idea is investigation of specific Code Sections and
|
||
if a Nationwide Pattern is shown, all the better.
|
||
|
||
LARRY ROSENBERG, ATTY
|
||
|
||
Prodigy: More of a Prodigy Than We Think?
|
||
By: Linda Houser Rohbough
|
||
|
||
The stigma that haunts child prodigies is that they are
|
||
difficult to get along with, mischievous and occasionally, just flat
|
||
dangerous, using innocence to trick us. I wonder if that label fits
|
||
Prodigy, Sears and IBM's telecommunications network?
|
||
|
||
Those of you who read my December article know that I was
|
||
tipped off at COMDEX to look at a Prodigy file, created when Prodigy
|
||
is loaded STAGE.DAT. I was told I would find in that file personal
|
||
information form my hard disk unrelated to Prodigy. As you know, I
|
||
did find copies of the source code to our product FastTrack, in
|
||
STAGE.DAT. The fact that they were there at all gave me the same
|
||
feeling of violation as the last time my home was broken into by
|
||
burglars.
|
||
|
||
I invited you to look at your own STAGE.DAT file, if you're a
|
||
Prodigy user, and see if you found anything suspect. Since then I
|
||
have had numerous calls with reports of similar finds, everything
|
||
from private patient medical information to classified government
|
||
information.
|
||
|
||
The danger is Prodigy is uploading STAGE.DAT and taking a look
|
||
at your private business. Why? My guess is marketing research, which
|
||
is expensive through legitimate channels, and unwelcomed by you and
|
||
I. The question now is: Is it on purpose, or a mistake? One caller
|
||
theorizes that it is a bug. He looked at STAGE.DAT with a piece of
|
||
software he wrote to look at the physical location of data on the
|
||
hard disk, and found that his STAGE.DAT file allocated 950,272 bytes
|
||
of disk space for storage.
|
||
|
||
Prodigy stored information about the sections viewed frequently
|
||
and the data needed to draw those screens in STAGE.DAT. Service
|
||
would be faster with information stored on the PC rather then the
|
||
same information being downloaded from Prodigy each time.
|
||
|
||
That's a viable theory because ASCII evidence of those screens
|
||
shots can be found in STAGE.DAT, along with AUTOEXEC.BAT and path
|
||
information. I am led to belive that the path and system
|
||
configuration (in RAM) are diddled with and then restored to
|
||
previous settings upon exit. So the theory goes, in allocating that
|
||
disk space, Prodigy accidently includes data left after an erasure
|
||
(As you know, DOS does not wipe clean the space that deleted files
|
||
took on the hard disk, but merely marked the space as vacant in the
|
||
File Allocation Table.)
|
||
|
||
I received a call from someone from another user group who read
|
||
our newsletter and is very involved in telecommunications. He
|
||
installed and ran Prodigy on a freshly formatted 3.5 inch 1.44 meg
|
||
disk. Sure enough, upon checking STAGE.DAT he discovered personal
|
||
data from his hard disk that could not have been left there after an
|
||
erasure. He had a very difficult time trying to get someone at
|
||
Prodigy to talk to about this.
|
||
|
||
--------------
|
||
|
||
Excerpt of email on the above subject:
|
||
|
||
THERE'S A FILE ON THIS BOARD CALLED 'FRAUDIGY.ZIP' THAT I SUGGEST
|
||
ALL WHO USE THE PRODIGY SERVICE TAKE ***VERY*** SERIOUSLY. THE FILE
|
||
DESCRIBES HOW THE PRODIGY SERVICE SEEMS TO SCAN YOUR HARD DRIVE FOR
|
||
PERSONAL INFORMATION, DUMPS IT INTO A FILE IN THE PRODIGY
|
||
SUB-DIRECTORY CALLED 'STAGE.DAT' AND WHILE YOU'RE WAITING AND
|
||
WAITING FOR THAT NEXT MENU COME UP, THEY'RE UPLOADING YOUR STUFF AND
|
||
LOOKING AT IT.
|
||
|
||
TODAY I WAS IN BABBAGES'S, ECHELON TALKING TO TIM WHEN A
|
||
GENTLEMAN WALKED IN, HEARD OUR DISCUSSION, AND PIPED IN THAT HE WAS
|
||
A COLUMNIST ON PRODIGY. HE SAID THAT THE INFO FOUND IN
|
||
'FRAUDIGY.ZIP' WAS INDEED TRUE AND THAT IF YOU READ YOUR ON-LINE
|
||
AGREEMENT CLOSELY, IT SAYS THAT YOU SIGN ALL RIGHTS TO YOUR COMPUTER
|
||
AND ITS CONTENTS TO PRODIGY, IBM & SEARS WHEN YOU AGREE TO THE
|
||
SERVICE.
|
||
|
||
I TRIED THE TESTS SUGGESTED IN 'FRAUDIGY.ZIP' WITH A VIRGIN
|
||
'PRODIGY' KIT. I DID TWO INSTALLATIONS, ONE TO MY OFT USED HARD
|
||
DRIVE PARTITION, AND ONE ONTO A 1.2MB FLOPPY. ON THE FLOPPY
|
||
VERSION, UPON INSTALLATION (WITHOUT LOGGING ON), I FOUND THAT THE
|
||
FILE 'STAGE.DAT' CONTAINED A LISTING OF EVERY .BAT AND SETUP FILE
|
||
CONTAINED IN MY 'C:' DRIVE BOOT DIRECTORY. USING THE HARD DRIVE
|
||
DIRECTORY OF PRODIGY THAT WAS SET UP, I PROCEDED TO LOG ON. I
|
||
LOGGED ON, CONSENTED TO THE AGREEMENT, AND LOGGED OFF. REMEMBER,
|
||
THIS WAS A VIRGIN SETUP KIT.
|
||
|
||
AFTER LOGGING OFF I LOOKED AT 'STAGE.DAT' AND 'CACHE.DAT' FOUND
|
||
IN THE PRODIGY SUBDIRECTORY. IN THOSE FILES, I FOUND POINTERS TO
|
||
PERSONAL NOTES THAT WERE BURIED THREE SUB-DIRECTORIES DOWN ON MY
|
||
DRIVE, AND AT THE END OF 'STAGE.DAT' WAS AN EXACT IMAGE COPY OF MY
|
||
PC-DESKTOP APPOINTMENTS CALENDER.
|
||
|
||
CHECK IT OUT FOR YOURSELF.
|
||
|
||
### END OF BBS FILE ###
|
||
|
||
I had my lawyer check his STAGE.DAT file and he found none other
|
||
than CONFIDENTIAL CLIENT INFO in it.
|
||
|
||
Needless to say he is no longer a Prodigy user.
|
||
|
||
|
||
Mark A. Emanuele V.P. Engineering Overleaf, Inc.
|
||
218 Summit Ave Fords, NJ 08863 (908) 738-8486
|
||
emanuele@overlf.UUCP
|
||
|
||
|
||
***** End of forwarded material *****
|
||
|
||
|
||
********************************************************************
|
||
Think globally, act locally
|
||
********************************************************************
|
||
|
||
News of the Earth (ISSN 1052-2239) consists of three components
|
||
|
||
NewsE-D Distribution
|
||
Global news and information
|
||
from shortwave radio broadcasts
|
||
NewsE-L Letters
|
||
News and reaction from readers
|
||
NewsE-S Supplements
|
||
Global news and information
|
||
from electronic and print sources
|
||
|
||
available separately by free subscription from
|
||
ListServ@IndyCMS (CREN)
|
||
ListServ@IndyCMS.IUPUI.Edu (Internet)
|
||
|
||
********************************************************************
|
||
|
||
News of the Earth supplements are edited by
|
||
|
||
Regina P Knight: RPKnight@USMCP6 (CREN)
|
||
Geert K Marien: GKMXU@CUNYVM (CREN)
|
||
GKMXU@CUNYVM.CUNY.Edu (Internet)
|
||
John B Harlan: IJBH200@IndyVAX (CREN)
|
||
IJBH200@IndyVAX.IUPUI.Edu (Internet)
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: "D.Baswell@adacp.com"
|
||
Subject: Comp.Org.Eff.Talk. comments on Prodigy FYI
|
||
Date: Sat, $ May 91 09:01:08 GMT
|
||
|
||
********************************************************************
|
||
*** CuD #3.16: File 4 of 6: Assorted Comments on Prodigy ***
|
||
********************************************************************
|
||
|
||
I find these posts from comp.org.eff.talk interesting. Hope you do
|
||
too.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
(Begin Posts):
|
||
|
||
Subject: Re: Prodigy charged with invading users' privacy
|
||
Date: 1 May 91 05:17:34 GMT
|
||
Sender: usenet@pcserver2.naitc.com (News Poster for NNTP)
|
||
|
||
in article <1991Apr30.225133.8165@craycos.com> jrbd@craycos.com (James
|
||
Davies) writes:
|
||
>> I received a call from someone from another user group who read
|
||
>>our newsletter and is very involved in telecommunications. He
|
||
>>installed and ran Prodigy on a freshly formatted 3.5 inch 1.44 meg
|
||
>>disk. Sure enough, upon checking STAGE.DAT he discovered personal data
|
||
>>from his hard disk that could not have been left there after an
|
||
>>erasure.
|
||
>
|
||
>Question: was he using an unused disk, or did he just reformat an old
|
||
>one, assuming that it would be wiped clean?
|
||
>
|
||
>Could some Prodigy user out there try this experiment again, this
|
||
>time using a verifiably empty disk? I get the feeling that this hasn't
|
||
>exactly been a controlled experiment so far...
|
||
|
||
Note one thing well:
|
||
|
||
All formats on a floppy disk ARE LOW LEVEL FORMATS. That is, all data is
|
||
physically erased, sector marks are rewritten, the whole works.
|
||
|
||
It is not possible on a DOS machine to issue a "FORMAT A:" and have any data
|
||
retained on the diskette from prior use.
|
||
|
||
Try it. You'll see that this is the case.
|
||
|
||
To do a controlled test, do the following:
|
||
|
||
1) Bulk erase and then format a floppy diskette. NO CHANCE of any
|
||
residual data on the disk surface after this.
|
||
|
||
2) Run a "cleandisk" program to write ZEROS to all unallocated areas of
|
||
the fixed disk in the machine. This will guarantee that all
|
||
unallocated areas, which may be used for scratch buffers, have no
|
||
data on them. The tail end of files are irrelevant -- that's an
|
||
ALLOCATED area and should not be touched by the software if it's
|
||
being "honest".
|
||
|
||
3) Install Prodigy on the floppy disk. Do not touch the hard drive,
|
||
or run any software from it. Work >only< on the floppy disk.
|
||
|
||
4) Call Prodigy. Spend an hour or two online. Give 'em plenty of time
|
||
to hose you if they're going to.
|
||
|
||
5) Sign off and look at STAGE.DAT on the floppy disk.
|
||
|
||
Alternately, after cleaning the disk, install the Prodigy software on the
|
||
fixed disk. DO NOT ACCESS ANY OTHER PROGRAMS OR DATA. Immediately run
|
||
Prodigy, dial in, and use it for a couple of hours.
|
||
|
||
Then check STAGE.DAT on the fixed disk.
|
||
|
||
Since you zeroed all unallocated areas on the drive before you began, there
|
||
is no way the STAGE.DAT file could have gotten private data in it unless the
|
||
software is scanning your fixed disk drive.
|
||
|
||
This should provide rather conclusive proof one way or the other.
|
||
|
||
I'm not a Prodigy subscriber, or I'd try this...
|
||
|
||
Subject: Re: Prodigy charged with invading users' privacy (was Re:
|
||
Date: 1 May 91 21:07:40 GMT
|
||
|
||
> zane@ddsw1.MCS.COM (Sameer Parekh) writes:
|
||
>
|
||
> Thank you for posting that. I had previously thought that Prodigy
|
||
>was simply a dumb service. Now I am committed to the education of people to
|
||
>stop using Prodigy. I will be writing an 'information sheet' which I will
|
||
>distribute so that we can educate those who are not on the net. I will post
|
||
>it here first so that I may get feedback on how it is.
|
||
> (I didn't hear about it from this post, a friend who obviously read
|
||
>this post told me about it.)
|
||
|
||
The evidence presented so far has been in a word "SHODDY". Before you go making
|
||
statements about this matter I would advise you to investigate more fully.
|
||
Telling people not to use this service because of a supposely found problem
|
||
that later turns out to be false opens the possibility of being sued for LIBEL.
|
||
You could be sued for loss of revenue for each and every user you convince to
|
||
discontinue or not use the service. This includes lost advertising revenue.
|
||
|
||
The "litmus" tests I have seen so far are invalid. They show a lack of
|
||
understanding of all the possible ways for this to happen (and there are many!)
|
||
|
||
The proper test should be:
|
||
wipe the hard disk clean -- i.e. low level reformat or wipedisk etc.
|
||
Note: This should be done to any and all disks, partitions, etc on the
|
||
system. (Or remove them)
|
||
2: insure all disks are clean!!
|
||
3: install test files to look for(if needed).
|
||
Do not delete anything. Do not use any disk compressor.
|
||
Just copy the files onto the disk.
|
||
4: POWER OFF the machine. Wait 10 min. (Yes, 10 MIN!)
|
||
5: Turn machine on and verify memory is clear.
|
||
Don't do anything except what is listed here. Especially don't go looking
|
||
at files. Don't do anything that might bring a file into memory or a disk
|
||
buffer.
|
||
6: install prodigy
|
||
7: run prodigy for a period of time (1 hour or so)
|
||
8: NOW check the STAGE.DAT file.
|
||
|
||
An even better test would to be to monitor the data being sent back to Prodigy.
|
||
|
||
Subject: Re: Prodigy charged with invading users' privacy
|
||
Date: 2 May 91 16:03:52 GMT
|
||
|
||
Now that there is some more reliable data on the STAGE.DAT "controversy",
|
||
I hope that everyone will settle down and stop accusing Prodigy of
|
||
spying on them. It appears that the "stolen personal data" in the
|
||
file was, as several people have speculated, just leftover pieces of
|
||
deleted files.
|
||
|
||
However, what nobody seemed to notice in all of this hysteria is that
|
||
Prodigy doesn't need to move data into STAGE.DAT in order to "steal" it.
|
||
They could just as easily have just directly snatched your client lists
|
||
and accounting records without buffering it to another file first (in fact,
|
||
a truly sneaky system would have done just that, I would say).
|
||
|
||
There is a lot of trust necessary to use any network software -- for all I
|
||
know, "rn" could be browsing through my files right this minute. However,
|
||
there is no reason for me to suspect this, and if it did happen and I
|
||
discovered it, I'm sure there would be hell to pay for the person responsible.
|
||
|
||
Prodigy is in a position to lose quite a bit if they were found to be
|
||
illegally spying on their users (can you say "deep pockets"? -- IBM is
|
||
the Grand Canyon of deep pockets...) It's inconceivable to me that they would
|
||
be pursuing such a risky policy.
|
||
|
||
jrbd
|
||
++++++++++++++++++++++++
|
||
|
||
Dear Dr. Pangloss
|
||
|
||
The stage.dat file is created when you install the prodigy software by
|
||
pulling random bits from your computer's memory and hard disk erased
|
||
space. This methods is the fastest way to create an "empty" file. As
|
||
you use the service, reusable service information is stored in the
|
||
file, overwriting random data stored there initially. When the
|
||
service can get information from your stage file, rather than from the
|
||
modem, the service speed is improved. Thanks for writing
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
Comments:
|
||
|
||
a. The original message was in upper case.
|
||
|
||
b. Although the basic outline is probably correct, I somehow doubt
|
||
that the setup sequence "pulls random bits from your computer's
|
||
memory.". It's probably using what ever was in the area last.
|
||
Not quite random. (And not a very nice way to write a program.
|
||
Me, I'd initialize everything to 0's or 1's.)
|
||
|
||
c. The moral is clear. Digital is forever. When you erase a file
|
||
you don't erase anything, you just tell the system that it can
|
||
reuse the space. Admiral Poindexter can testify to that. (And so
|
||
can Peter Norton who's saved many a person's skin.)
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: FYI
|
||
Subject: Prodigy's Response to Stage.dat File
|
||
Date: May 5, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.16: File 5 of 6: Prodigy's response to Stage.dat File***
|
||
********************************************************************
|
||
|
||
{Moderator's note: We received a number of copies of the following
|
||
response by Prodigy to the Stage.dat problem.}
|
||
|
||
PRODIGY(R) interactive personal service 05/03/91 10:49 PM
|
||
|
||
The Privacy of Member Information
|
||
|
||
Some members have asked recently about the privacy of information
|
||
they store on their personal computers, as it relates to their use of
|
||
the PRODIGY service. I felt this subject was important enough to
|
||
inform all our membership about it.
|
||
|
||
Privacy of a member's personal information is of primary importance
|
||
to us. We know that our members consider this kind of information
|
||
proprietary, and so do we.
|
||
|
||
A recent, unsubstantiated and incorrect newspaper report suggested
|
||
that members' personal information--unrelated to their use of the
|
||
PRODIGY service--is being transmitted to our host computers from our
|
||
members' computers. This is simply not true. It never has been.
|
||
|
||
We have no central computers that access private computer files. The
|
||
PRODIGY service software does not read, collect, or transmit to the
|
||
Prodigy Services Company any information or data that is not directly
|
||
connected with your use of the service.
|
||
|
||
Member privacy has always been a top priority for Prodigy. Your use
|
||
of the service can continue with the highest confidence that your
|
||
personal data will not be accessed by us.
|
||
|
||
Ted Papes
|
||
President, Prodigy Services Company
|
||
May 2, 1991
|
||
|
||
You may have recently read about data from other files appearing
|
||
inside the STAGE. This is a harmless side effect of DOS file
|
||
operations and the process by which the PRODIGY STAGE is created. On
|
||
the following screens you'll find a discussion of your STAGE.DAT
|
||
file.
|
||
|
||
If you're interested in the details, please read on. I think you'll
|
||
be more comfortable once you've read the facts.
|
||
|
||
Harold Goldes (CBXH97A)
|
||
Technical Editor, PRODIGY Star
|
||
|
||
|
||
used by the STAGE has prompted some to speculate that PRODIGY can gain
|
||
access to that information or other information on a member's hard
|
||
disk. Here are the facts:
|
||
|
||
The PRODIGY software does not examine a member's hard disk as a
|
||
whole. It does not read files created by other software. It does
|
||
not read data other than its own. It does not upload files to do
|
||
this. The PRODIGY software confines its file operations to a
|
||
limited and well defined section of your disk: The PRODIGY
|
||
directory.
|
||
|
||
When you install the PRODIGY software on your computer we create a
|
||
unique file on your floppy or hard disk: STAGE.DAT. The STAGE (or
|
||
STAGE.DAT as it appears in your directory or folder) is a "container".
|
||
What does it hold?
|
||
|
||
The STAGE contains frequently used information and instructions that
|
||
make up PRODIGY applications ("applications" refers to the individual
|
||
activities available to you on the service; FIND and the Movie Guide,
|
||
are examples).
|
||
|
||
Placing portions of applications on the STAGE (and not in other more
|
||
remote parts of our network) puts them close to you. Without a storage
|
||
structure like the STAGE, key components of an application would be
|
||
sent to your computer whenever you visited the application. This adds
|
||
transmission time. Placing them on your computer saves time. When you
|
||
install the DOS version of the PRODIGY software, you have the choice
|
||
of creating the STAGE in a range of sizes from about 160Kb to 950Kb.
|
||
For Macintosh users there is one size: 200,064 bytes.
|
||
|
||
If a member installs to a floppy disk(s), the STAGE may vary in size.
|
||
These intermediate sizes depend on several factors including the
|
||
capacity of the disk and the version of DOS. Once it's been created,
|
||
the STAGE never changes its size. But the date and time stamp on the
|
||
STAGE does change and is updated at the end of every PRODIGY session.
|
||
This reflects the fact that during your session we read PRODIGY
|
||
content from it and write updated PRODIGY content to it. To improve
|
||
performance during your session, certain frequently used parts of the
|
||
service are always "staged". A larger STAGE, should you choose one,
|
||
permits a growing inventory of applications to reside on your
|
||
computer. Because our software adapts itself to you, some of the
|
||
content you use regularly can become staged.
|
||
|
||
Whenever and wherever you logon to the Prodigy service, we check to
|
||
see if you've got the latest versions of a variety of programs and
|
||
data that reside in the STAGE. If not we send you what you need. You
|
||
don't have to ask for new disks. And you don't have to reinstall.
|
||
|
||
Some members use RAMdisks to improve performance. A RAMdisk is a "disk
|
||
drive" made from memory (RAM) not from mechanical parts. It's faster
|
||
than its physical counterpart but can more easily lose data. For that
|
||
reason we don't recommend using a RAMdisk. However here's something
|
||
to keep in mind if you're going to do it anyway. A RAMdisk is
|
||
volatile. If you turn your machine off, the information stored on the
|
||
RAMdisk evaporates. As you may be receiving an update each time you
|
||
sign on, be sure to save the updates. To do this, copy the file named
|
||
STAGE.DAT back to your PRODIGY directory before you hit that switch.
|
||
|
||
Members often ask about the need to update the PRODIGY software on
|
||
their PRODIGY installation disks. There is no need to update the
|
||
original installation disks. Use those disks (or backup copies) to
|
||
install the software on any computer you use to sign on to the PRODIGY
|
||
Service. Then, when you sign on for the first time, the service will
|
||
automatically update the PRODIGY software.
|
||
|
||
Suppose you have two computers and use them both to access the
|
||
service. Let's say you use one more frequently than the other. Each
|
||
of your computers will get updates, if needed, when you use them. The
|
||
machine used most frequently will be updated steadily (almost
|
||
imperceptibly) by increments. When you use the other machine, you
|
||
might notice a delay during logon because it's receiving a greater
|
||
amount of updated information all at once.
|
||
|
||
There's a practical limit to the kinds of changes we can make
|
||
automatically to an existing version of the software. If you've ever
|
||
tried adding air conditioning to a car you bought without it, you'll
|
||
understand this; sometimes it's best to start over with the really
|
||
useful options built in. So over time when we make extensive
|
||
improvements to the PRODIGY software, we may send you a new set of
|
||
disks. From time to time members using the DOS version of the PRODIGY
|
||
software see information from "other" (non-PRODIGY) applications in
|
||
the disk space used by STAGE.DAT.
|
||
|
||
Data from non-PRODIGY files is never actually part of STAGE.DAT. More
|
||
importantly it is never accessed or uploaded by the PRODIGY software.
|
||
There are two ways in which extraneous data can appear in the STAGE.
|
||
In the first case, the data was originally located in areas of the
|
||
hard disk once used by other software. At one point in the past, this
|
||
data was erased.
|
||
|
||
When you erase a file, PC-DOS or MS-DOS (the operating system for
|
||
personal computers) does not remove the file's contents from your
|
||
disk. Instead it only marks the space used by the file as now
|
||
"available for use". In doing this, it gives other software permission
|
||
to reuse that space. Until that space is used by its new owner, the
|
||
old data remains. This is why certain "unerase" software packages can
|
||
recover accidentally deleted files. When you install the PRODIGY
|
||
software, it asks DOS to supply disk space for the STAGE.DAT file.
|
||
Depending on the size of the STAGE you choose, this is usually a
|
||
request for anywhere between 160Kb to 1 Mb.
|
||
|
||
DOS then checks its inventory of available disk sectors, finds the
|
||
space and reserves it for its new owner: STAGE.DAT. But DOS leaves
|
||
any old data in that space intact. Please keep in mind that DOS simply
|
||
supplies the sectors we request (as long as they are available) and
|
||
does not touch their original contents. Next, our install program
|
||
starts filling the space with blocks of PRODIGY information. The
|
||
PRODIGY install program does not erase any old data because to do so
|
||
would appreciably lengthen the install process. As a result, old
|
||
"erased" data may appear in unused space following the blocks (where
|
||
it's more noticeable) as well as in smaller areas that occur within
|
||
the blocks (for more on this see "HOW WE USE SPACE" below). If you
|
||
chose a large STAGE (anything from 250Kb to 950Kb), chances are that
|
||
at first, a portion of it will be unused. It is likely that some of
|
||
the space within that unused portion was used by other software at one
|
||
time. If so what you'll see if you examine that area will be
|
||
"leftovers". Over time, the PRODIGY software will write blocks of
|
||
information to the STAGE replacing whatever is there. Please keep in
|
||
mind that the PRODIGY software can only recognize the blocks of
|
||
information that it puts into STAGE.DAT itself. It does not read,
|
||
collect, process or transmit "non-PRODIGY data". All disk space
|
||
containing such data is treated as empty.
|
||
|
||
Like most major software, to ensure compatibility and reliability when
|
||
creating, reading and writing files, the PRODIGY software employs
|
||
standard "services" provided by your computer's operating system. By
|
||
viewing the STAGE with certain software tools, members have observed
|
||
information from non-PRODIGY applications. However the PRODIGY
|
||
software can neither see this information nor use it. To the PRODIGY
|
||
software this space is considered "empty" and available for storing
|
||
PRODIGY data. Over time, as you use the service, this "empty" space is
|
||
covered by PRODIGY content.
|
||
|
||
When we store data in the STAGE, we do it via DOS in blocks of a
|
||
specific size. Let's say that size is 100 bytes. If we store a 120
|
||
byte "object" then we use two blocks (or 200 bytes of storage). What
|
||
we store takes up all of the first block but only 20 bytes of the
|
||
second block. What happens to the remaining 80 bytes of the second
|
||
block? Whatever was there originally remains. If that block was built
|
||
on a previously used sector, 80 bytes of "old" data will be seen.
|
||
|
||
There's a second way in which extraneous data may appear within the
|
||
disk space used by the STAGE. When the STAGE is being created, certain
|
||
"control" areas may incorporate information that was in your
|
||
computer's memory (RAM). These areas are used by the STAGE itself to
|
||
keep track of its own contents. This extraneous data may include
|
||
non-erased data or data from another disk. You may observe the names
|
||
of directories, your PATH, or information from the software you were
|
||
using just before you installed the PRODIGY software. To minimize the
|
||
occurrence of this data within the STAGE, just turn your PC off, wait
|
||
15 seconds then turn it on again before installing the PRODIGY
|
||
software. In short, extraneous information can appear in the disk
|
||
space used by the STAGE and yet not actually be part of it. The
|
||
appearance of this "non-PRODIGY data" is a side effect of DOS file
|
||
operations or the process by which the STAGE is created. But, like a
|
||
bottle containing oil and water, this disk space STAGE can contain
|
||
both PRODIGY and non-PRODIGY data which are different and remain
|
||
separate.
|
||
|
||
The PRODIGY software does not read information created by other
|
||
software. And it does not read data other than its own. Nevertheless
|
||
some members have tried to delete non-PRODIGY data from the STAGE by
|
||
using file editors. Modifying the contents of the STAGE file will do
|
||
more harm than good. To maintain the integrity of the STAGE, we use
|
||
special techniques that detect alteration of its contents. Changing
|
||
the contents of the STAGE with a software tool (like an editor) will
|
||
render the STAGE unusable. You'll have to reinstall the PRODIGY
|
||
software. For those members who are concerned by even the appearance
|
||
of extraneous data within the STAGE, we are preparing a utility to
|
||
eliminate non-PRODIGY data from the STAGE.
|
||
|
||
No extraneous information appearing within the disk space used by
|
||
STAGE.DAT is known to or used by PRODIGY.
|
||
|
||
The only information used by the PRODIGY software is what is needed
|
||
for the installation and operation of the software.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Moderators
|
||
Subject: A Few Observations on Prodigy
|
||
Date: 8 May, 1991
|
||
|
||
********************************************************************
|
||
*** CuD #3.16: File 6 of 6: A Few Observations on Prodigy ***
|
||
********************************************************************
|
||
|
||
|
||
Prodigy customers can decide for themselves whether they are satisfied
|
||
with the service, and the internal policies of a commercial system are
|
||
normally of little direct CU interest. Here, however, we see at least
|
||
two issues that potentially touch the rest of us.
|
||
|
||
First, whatever the inadequacy of Prodigy's software or the tarnish on
|
||
their public image, the stage.dat case raises the same issues that
|
||
"hackers" have been raising for over a year. The legitimate concerns
|
||
of users regarding the potential danger to privacy seem over-ridden by
|
||
the same hysteria and "lynch mob" mentality that has accompanied law
|
||
enforcement attention to the CU. Prodigy may not be the most
|
||
sympathetic of victims, but they seem to be victimized by the same
|
||
excesses, this time from the private sector, as other individuals
|
||
received from law enforcement. Prodigy management may not handle its
|
||
crises well, but this is not a crime, and using a flaw in a program to
|
||
impute broader motives reminds us of how prosecutors distorted the
|
||
significance of the E911 files, how AT&T fabricated the value of
|
||
"losses," or how prosecutors creatively misconstrued facts or legal
|
||
language to finagle a version of reality to their liking.
|
||
|
||
A second issue, one more chilling, was raised by Emmanuel Goldstein of
|
||
2600 Magazine. If user-interface software can access information ona
|
||
hard drive, consider this scenario: A serial killer is suspected of
|
||
being a computerophile. A "psychological profile" has narrowed down
|
||
possible suspects who may have an account on a system (like Prodigy)
|
||
that essentially takes temporary control of a system while the user is
|
||
logged on. Under existing law, can investigators use such such
|
||
systems to "invade" the hard drives of suspects looking for potential
|
||
evidence? And, if so, how can this evidence be used? Now, substitute
|
||
"serial killer" for "hacker," "pirate," or "marijuana user."
|
||
|
||
Take another example. If the Secret Service engages in video taping of
|
||
the kind it did in Summercon '88 without significant public outcry,
|
||
how hard would it be to engage in comparable monitoring of "suspects"
|
||
hard drives? We have seen from Sun Devil and other operations (eg,
|
||
Steve Jackson Games) how easily search or seizure affidavits can
|
||
distort "reality." A year ago we would have thought the possibility of
|
||
hard drive snooping absurd. But, we also would have disbelieved that
|
||
the SS would poke holes in motel rooms to video tape 15 hours of
|
||
people eating pizza and drinking beer.
|
||
|
||
The crucial question of Prodigy's stage.dat is not an individual
|
||
company's policies, but rather the ability for such programs to be
|
||
used by those with the power to abuse it.
|
||
|
||
********************************************************************
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #3.16**
|
||
********************************************************************
|
||
|
||
|
||
|