Finnish Firm Claims Fake P2P Hash Technology 748
An anonymous reader writes "As reported by The Inquirer, a Finnish company known as Viralg Oy claim to have developed software that can create a junk file with the same hash as a genuine p2p download. This, according to the company, can altogether stop the sharing of copywritten files by flooding p2p networks with corrupt/junk data, which then spreads through the network, causing less and less of the original file to be available. However, with the resolve of the p2p userbase, is this software really going to 'beat all Peer 2 Peer pirates at their own game,' or simply prove a minor annoyance?"
Just an annoyance (Score:4, Insightful)
Re:Just an annoyance (Score:5, Funny)
Re:Just an annoyance (Score:4, Insightful)
Re:Just an annoyance (Score:3, Informative)
Re:Just an annoyance (Score:5, Funny)
Re:Just an annoyance (Score:5, Funny)
Re:Just an annoyance (Score:5, Funny)
"Life... uhhhh.. will..uhh... find a way!"
Agreed (Score:5, Interesting)
What is neat, or not so neat depending on your point of view, are music files which deteriorate after a while. I don't know how they are made, but I have listened to music that sounds pretty good, but after the 10th playing it starts skipping. Or it could be those skips are not very noticable when first played, but once identified, they become annoying.
Re:Agreed (Score:3, Insightful)
I suspect your hard drive is failing.
Re:Agreed (Score:4, Interesting)
Not definitly...I've seen that technology for games(see link) and I remember microsoft had suggested doing that for MP3s and some other things with DRM [soundonsound.com]. I don't know if the it's been put into place yet or not.
Re:Agreed (Score:3, Funny)
These are zoot files. Every once in a while, they skip a groove.
Re:Agreed (Score:3, Interesting)
Sometimes they download a bad file, and share it. It would make more sense to have a "unchecked" folder for downloads, then more it to the "checked" folder to share.
The filesharing programs I use force you to share the directory you download into. Sure, I could name the download directory "unchecked", but few people bother to view the full paths as set by the sources from the people they download.
What is neat, or not so neat depending on your point of view, are music files which deteriorate after a w
Re:Agreed (Score:3, Informative)
Re:Agreed (Score:3, Informative)
Re:Agreed (Score:5, Insightful)
Re:You're just a paranoid troll. That's not insigh (Score:4, Funny)
Patience is a virtue, right?
incomplete downloads (Score:4, Informative)
That would break a feature which enables greater sharing... Uploading of parts of files that you do not have all of. Think BitTorrent, but less organized...
Re:Agreed (Score:4, Funny)
The files are perfectly normal -- you're simply realizing that most of the music out there is trash which simply repeats the same verses over and over again so much that it sounds like it's skipping. Add to that the endless remixes which ruin perfectly good songs, and I can see how you'd mistake that with repetitive skipping. Rest assured that a better choice in music will alleviate this problem.
Re:Not going to work that way.... (Score:3, Interesting)
How about a hash of the entire file, plus a hash of every 128 KB segment. Constructing a file that matches all of the 128 KB section hashes, plus the overall hash is a much more difficult problem.
Plus, you know after downloading only 128 KB that the file is not the real deal. It only takes 8 * 128 bytes or 1024 bytes of hash information per megabyte of download -- really only a few packets to communicate the hash list for, say, a 10 MB file. The benefit for this
Re:Just an annoyance (Score:4, Interesting)
Re:Just an annoyance (Score:5, Informative)
Why would this not be "just double work"?
First you find all files matching the first hash, then filter out one matching the second.
And where exactly do you think the work is occuring? Computing the second hash. If you have one hash algorithm, you only have to match once. If you have two hash algorithms and you did it this way, you have to match enough with the first algorithm to find a match for the second algorithm. This isn't twice as much work, this is twice as much keyspace (with each bit increase in keyspace representing twice the work)
Re:Just an annoyance (Score:3, Informative)
While I'm at it...
With an 8-bit hash key, there are 256 possible keys. This means that 1/256 files will match the hash. With another hash function with 8-bit keys there are 1/256/256=1/65536=1/(256^2)=1/((2^8)^2) files matching the two keys. This keyspace is indeed the same size as that of a 16-bit key with the important difference that it is much easier to find matches if you can partition the search space.
Picture yourself an unpainted 65536-piece square jigsaw puz
This is so stupid (Score:5, Insightful)
P2P is a technology. Yes it can be used for copyright violations, just like a photocopy machine or tape recorder. But it also has amazing possibilities in terms of creating a universal organic archive. Crippling like this -- and through using lawsuits -- is an unnecessary attack on a system in its infancy.
The copyright issues will work themselves out -- until the 20th century human art and ingenuity survived for thousands of years without the ability to make millions selling recorded music and video. If p2p has a major effect on the entertainment industry's ability to profit (and I'm still not convinced that it really will), human art and culture will survive. And people will continue to find ways to make a living creating art.
Re:This is so stupid (Score:4, Interesting)
And those things were each also embroiled in copyright lawsuits by big corporations in their day. The difference is that today, the big corps have finally gained enough political leverage to get it their way.
Corporations are the new first-class citizens. Any individual, regardless of race, gender, or creed, is second-class compared to a corporation.
I honestly fear that by the time the American people get fed-up enough to realize this, the transformation will be complete, and we will be powerless to change it.
Re:This is so stupid (Score:3, Interesting)
Re:This is so stupid (Score:4, Funny)
Hell, you could hire hackers to flood the network, prove damages, and then earn <dr evil> BILLIONS </dr evil>. Of course, this implies the Supreme Court in the US rules the way I am implying...
Re:This is so stupid (Score:3, Informative)
early in the lives of gotwoot and scarywater (large, fairly well known fansub bittorrent tracker sites), they encountered ddos issues...
people were using botnets and what amounts to trivial network code to send false complete requests to the trackers, and volunteering as seeds. So, in a field of maybe 100-200 legitimate seeds, there would be ~30,000 fakes poisoning
Re:This is so stupid (Score:3, Insightful)
The main concern shouldn't be the use by the RIAA or MPAA to stop the bootlegging of copyrighted concerns. It's within their rights. The main concern should be possibility of the technology getting out to griefers who block the legitimate use of Bittorrent.
But honestly, if this doesn't get out to hackers (which it probably will), this is a lot better solution than having to sue warez websites, or the users who illegally trade movies.
Re:This is so stupid (Score:3, Insightful)
This isn't some idealistic universe where all decisions are morally right or wrong regardless of the criteria. Your knee-jerk reaction is baseless and inflammatory.
"Look people.. If this gangrene wasn't present here, chopping off my leg would be completely unacceptable! How can we just go around chopping off people's legs? Just because I have g
Re:Just an annoyance (Score:5, Interesting)
Nope (Score:4, Insightful)
They have cracked strong hashes, huh? (Score:5, Informative)
Or they have cracked even the strong hashes. In which case they are really cool. I know Mr. Torvalds is Finnish, but I doubt even he could come up with algorithms to do that.
In their conceited press release, they have compared Spoofing vs DRP/a [mithuro.com]
Re:They have cracked strong hashes, huh? (Score:5, Insightful)
BitTorrent, they would need to be able to
generate colisions in sha1 hashes. The
implications of which would go well beyond p2p.
Re:They have cracked strong hashes, huh? (Score:5, Insightful)
You cracked SHA-1. Oh well, time to switch to SHA-256
Re:That sig is from diskworld, isn't it? (Score:4, Informative)
I can really reccommend Terry Pratchett's [wikipedia.org] books to everyone.
Re:They have cracked strong hashes, huh? (Score:3, Insightful)
I'd really like to know if this interpretation is flawed. Even when hash algorithms are broken, if you parallelise them, you can still get enough bits of security to work. It seems to me that you
Re:They have cracked strong hashes, huh? (Score:4, Informative)
Re:They have cracked strong hashes, huh? (Score:3, Informative)
> somewhere in between as strong
> as a 320bit hash and a 160bit
> hash
That's exactly what I'm saying. If the two hashes are completely independent -- zero bits of redundancy -- then you have a 320 bit hash. If they're completely redundant, you have a 160 bit hash. So the question is how independent MD5 and SHA1 are; if they're completely independent, then they combine to a 288 bit hash. If they're completely redundant, they combine to a 160 bit hash and you may as w
Re:They have cracked strong hashes, huh? (Score:3, Interesting)
The anti p2p software appears to find invalid collisions which mean the downloaded file is useless.
Finding collisions where the movie/app/document remains valid will be MUCH more tricky.
Re:They have cracked strong hashes, huh? (Score:5, Funny)
I'll make millions!
Re:They have cracked strong hashes, huh? (Score:2)
Re:They have cracked strong hashes, huh? (Score:5, Insightful)
Either way, I give it about a 0 chance they figured out how to quickly find collisions in a strong hash space. If they had, they'd be talking to the NSA, not the RIAA.
Re:They have cracked strong hashes, huh? (Score:4, Insightful)
Safe money bets that horse.
Re:They have cracked strong hashes, huh? (Score:5, Insightful)
Re:They have cracked strong hashes, huh? (Score:5, Funny)
What makes you so sure that NSA pays better?
Re:They have cracked strong hashes, huh? (Score:5, Funny)
"hand this over, or we'll make sure you never see the sun ever again"
Re:They have cracked strong hashes, huh? (Score:5, Funny)
Oh noes! The NSA are going to destroy the sun!
Re:They have cracked strong hashes, huh? (Score:3, Funny)
Why the stereotype about NSA agents disappearing people? That kind of crap only happens in dictatorships. You can't do that in the USA because we are the land of the free! I know some NSA agents and they're great gu.f.a.,.adf,.ty....mrgATZ+++++
Re:They have cracked strong hashes, huh? (Score:4, Funny)
Blaaaaaah (Score:5, Informative)
And, breaking hashes, nonsense. If anything, maybe they are managing to manipulate P2P protocols to send you data you weren't supposed to be getting, but which is not actually going into the checksum?
Nothing for you to see here, methinks... and here I am wasting my time actually writing a reply to a trollish article.
On another random note, I kind of liked how their website looked in links.
Empty.
Re:They have cracked strong hashes, huh? (Score:4, Insightful)
Sure, you can find a collision, but finding a collision which has a size close enough to the more popular real file is a lot more difficult, I'd think.
Re:They have cracked strong hashes, huh? (Score:5, Informative)
RIAA can lie to the tracker (Score:3, Insightful)
Unless the tracker double-checks the file itself, or has some way to trust the clients it's getting reports from, it's vulnerable to being lied to.
Bite My Shiny Metal Ass (Score:5, Funny)
Re:Bite My Shiny Metal Ass (Score:3, Funny)
Forget the p2p algorithm and the blackjack, I'll take the HASH!
"Copyrighted" (Score:5, Informative)
Preview/Trailer (Score:3, Interesting)
One believes this kind of fake files will only add burden to the internet, as users will just download one fake file after another until they got a hit.
The other believes that such annoyance will put most people off, because the total time/cost it takes to acquire something is now higher than the actual product.
I don't think MP3s will be affected because you can start playing the song if you've got the first bit. Can/will other file formats do that too?
Re:Preview/Trailer (Score:5, Funny)
Coral Cache (Score:5, Informative)
Re:Coral Cache (Score:3, Funny)
What would?
Re:Coral Cache (Score:3, Funny)
The question is.. (Score:3, Interesting)
Possible? Yeah (Score:5, Interesting)
Now, what the company has to do is create a file of the SAME FILE SIZE, with the same MD5 hash that's a fake
There is one way.... (Score:5, Funny)
You can always ensure an identical hash and size by filling the file with identical data and then uploading the new file to the P2P network. Imagine how quick filesharing would stop if all of the major industry groups started doing this. P2P wouldn't stand a chance, no siree.
Re:Possible? Yeah (Score:3, Interesting)
Re: SHA-1:
These are not theoretical results but actual collisions.
Again, here it is preimage attacks that are the problem, not just any collisions. But the results mentioned in the link are NOT actual collisions, just an algorithm to produce those collisions that might be feasable to run sometime soon. They didn't
Minor annoyance at first.... (Score:5, Interesting)
claims? (Score:5, Interesting)
What hashing algorithm do they claim to have broken so completely? Sounds like BS to me.
Re:claims? (Score:3, Informative)
Anybody remember the name of that company that promised extremely high lossless compression rates on arbitrary files?
Allow me to be one the first to say... (Score:5, Insightful)
Bullshit. "Virtual Algorithms" my ass.
Re:Allow me to be one the first to say... (Score:5, Insightful)
Secure Hashes vs. Fake Files (Score:2)
The easy solution:
Use a safer Hash function.
Re:Secure Hashes vs. Fake Files (Score:3, Interesting)
Or even better, use more than one. If file_x is hashed 10 different ways, using 10 different algorithms, there's no way the file generated by this firm will behave the same way for ALL of them, perhaps not even for two.
Re:durfy durfy (Score:3, Insightful)
Howoever, If you use more than one algrithm, it becomes harder to find a collision that fits both systems AND has the correct file size. This would probably increase in a exponential fashion(read: impossible).
For all the new 'copysafe' tech that comes out... (Score:4, Insightful)
Er.. (Score:3, Interesting)
Add another hash (Score:2, Insightful)
Their site is down so I can't get any real details, but I think this is smoke and mirrors in any case.
Possible Solution (Score:3, Insightful)
I'm pretty sure that should reduce the collisions to some stupidly small value.
Link to the patent application (Score:5, Informative)
Note the claims section and references - they keep talking about Napster and Kazaa - nothing about anything that use hashes.
Re:Link to the patent application (Score:3, Interesting)
The obvious way to counter this is to either fix Kazaa or switch to a network where the whole file is hashed.
Only The Whole File? (Score:5, Insightful)
Seems like this company's setup would only work in very specific circumstances, meaning it won't have much of an effect at all.
Seems bogus to me (Score:5, Informative)
Unless they have lots of supercomputer time, seeding the occasional p2p file with bad data will be very expensive.
Re:Seems bogus to me (Score:5, Informative)
Quoting from the linked page [cryptography.com]:
Re:Seems bogus to me (Score:3, Informative)
A sha hash is what? 256bit?
so you get 32byte per block.
Now how many pertubation can you get...
Lets assume your p2p software uses block sizes of 4byte. For a complete database you would need 2^32*32Byte=128Gbyte.
For a complete 8byte set you would need 2^64*32byte.
All the storage space in the world wouldnt even be enough for a 128Byte block, and bittorrent uses a minimum of 32Kbyte, edonkey even has a hash over the total filelenght.
For 32Kbyte, there isnt enough matter inthe universe to store enough inf
Sharing (Score:3, Interesting)
Anything less robust, you're liable to have collisions, such as these, apparently. Any more, and if you have a lot of files, there's a major time committment before you can actually begin to serve anything -- most people aren't willing to have their CPU pegged for 2 days straight while their P2P client hashes their 35,000 MP3s and 200 movies, or so.
Hash (Score:3, Interesting)
if this technology is true, it'll completely undermine the safety of today's unix passwords, which are stored in clear text of their hash.
By God (Score:5, Insightful)
Hashes are cheap, use several (Score:3, Insightful)
Let's just concede they can actually produce a junk file which has the same hash. I'll even skip over which hash - let's also say it's one of the useful ones.
I'd be tempted to step up the credentials for a file, say one hash for the entire file, and another for the first 1kb, and so on. It should get significantly harder with each additional verification point.
If they crack the hash (Score:5, Funny)
Sword Cuts Both Ways (Score:3, Interesting)
If someone can really poison P2P networks with junk that hash matches (and I have a difficult time believing they've cracked all the hash generators), then consider some hypothetical entity probing illicit distribution of copyrighted material using hashes. They could end up making false accusations against individuals for trading trash instead of Trash©.
bittorrent uses sha1 (Score:3, Informative)
The Bittorrent protocol uses SHA1 hashing [bittorrent.com].
Yes, there was recently a paper presented that "broke" SHA1, but the result is 2**69 operations instead of 2**80 [schneier.com] to find a SHA1 collision. 2**69 is still a very large number of operations... a lot less than a full 2**80, but still a prohibitively large number (more costly than the actual realized losses the entertainment industry is suffering).
Collateral Damage (Score:5, Insightful)
Here is a tool specifically designed to cripple the flow of data, how can it be thought of as anything but a virus? Should it work I could see TV and Movie studios using it surreptitiously to cripple net-based fledgling media companies.
This should be outlawed just like another intentionally malevolent software. Why shouldn't everyone write viruses and malware when the big guys do it and the government sanctions it. This is just the kind of thing that keeps web commerce from taking off to its full potential.
Interesting idea, how can we apply it to spam? (Score:5, Interesting)
For example, if we could pollute spammers' email address databases with millions of bogus e-mail addresses, then instead of delivering millions of spam e-mails to real e-mail accounts every day, maybe spammers could only reliably send a few hundred to users, the rest of their messages would be to bogus addresses and be "noise" that spammers have to deal with.
How could we go about doing this?
Re:Interesting idea, how can we apply it to spam? (Score:4, Informative)
(X) technical ( ) legislative ( ) market-based ( ) vigilante
approach to fighting spam. Your idea will not work. Here is why it won't work. (One or more of the following may apply to your particular idea, and it may have other flaws which used to vary from state to state before a bad federal law was passed.)
( ) Spammers can easily use it to harvest email addresses
( ) Mailing lists and other legitimate email uses would be affected
( ) No one will be able to find the guy or collect the money
( ) It is defenseless against brute force attacks
( ) It will stop spam for two weeks and then we'll be stuck with it
( ) Users of email will not put up with it
( ) Microsoft will not put up with it
( ) The police will not put up with it
( ) Requires too much cooperation from spammers
( ) Requires immediate total cooperation from everybody at once
( ) Many email users cannot afford to lose business or alienate potential employers
(X) Spammers don't care about invalid addresses in their lists
( ) Anyone could anonymously destroy anyone else's career or business
Specifically, your plan fails to account for
( ) Laws expressly prohibiting it
( ) Lack of centrally controlling authority for email
( ) Open relays in foreign countries
( ) Ease of searching tiny alphanumeric address space of all email addresses
( ) Asshats
( ) Jurisdictional problems
( ) Unpopularity of weird new taxes
( ) Public reluctance to accept weird new forms of money
( ) Huge existing software investment in SMTP
( ) Susceptibility of protocols other than SMTP to attack
( ) Willingness of users to install OS patches received by email
( ) Armies of worm riddled broadband-connected Windows boxes
( ) Eternal arms race involved in all filtering approaches
(X) Extreme profitability of spam
( ) Joe jobs and/or identity theft
( ) Technically illiterate politicians
( ) Extreme stupidity on the part of people who do business with spammers
( ) Dishonesty on the part of spammers themselves
( ) Bandwidth costs that are unaffected by client filtering
( ) Outlook
and the following philosophical objections may also apply:
(X) Ideas similar to yours are easy to come up with, yet none have ever
been shown practical
( ) Any scheme based on opt-out is unacceptable
( ) SMTP headers should not be the subject of legislation
( ) Blacklists suck
( ) Whitelists suck
( ) We should be able to talk about Viagra without being censored
( ) Countermeasures should not involve wire fraud or credit card fraud
(X) Countermeasures should not involve sabotage of public networks
( ) Countermeasures must work if phased in gradually
( ) Sending email should be free
( ) Why should we have to trust you and your servers?
( ) Incompatiblity with open source or open source licenses [hey, it's Microsoft... they've probably already submitted the patent...]
( ) Feel-good measures do nothing to solve the problem
( ) Temporary/one-time email addresses are cumbersome
( ) I don't want the government reading my email
( ) Killing them that way is not slow and painful enough
Furthermore, this is what I think about you:
(X) Sorry dude, but I don't think it would work.
( ) This is a stupid idea, and you're a stupid person for suggesting it.
( ) Nice try, assh0le! I'm going to find out where you live and burn your house down!
Bad news for the music industry (Score:5, Funny)
Just finding a hash collision isn't enough really (Score:3, Interesting)
For example, you send the company a copy of the .mp3 file you want to drive out of circulation. They feed it to a computation cluster and eventually out comes another file which has the same hash. You then publish this new file with the same filename on the victim P2P network and hope that it spreads enough to poison the P2P well, so to speak. There are a number of problems with this scheme (assuming of course that this is the sort of scheme that they offer):
Why this won't affect Slashdot. (Score:5, Funny)
"This, according to the company, can altogether stop the sharing of copywritten files by flooding p2p networks with corrupt/junk data"
Slashdot should rejoice at this! Since none of us download illegal material and nobody that any of us knows downloads illegal material, this technology might allow us to continue our legal, legitimate downloading of media and only target those handful of ruffians who engage in illegal filesharing. I'm all in favor of this!
Missing the Point (Score:5, Funny)
These guys are not about taking out P2P.
They are part of a denial of service attack against the RIAA and MPAA, and we need more companies like them in order to make it effective.
You see, it works like this:
1) Make up a really snazzing sound anti-piracy product,
2) Back it with lots of sexy buzzwords and hand-waving
3) Sell, sorry LICENSE, it for lots of money to the (RI|MP)AA.
4) When it fails to perform, let in the next guy ready to do the same.
Repeat until (RI|MP)AA bank accounts have been depleted.
As someone who actually _does_ have a P2P attack.. (Score:5, Informative)
The attack is to use the recently released collision -- which creates two blocks that, when mixed against the default initial state of MD5, emit the same system state. Every 32K, you can embed one or the other in the file you're transmitting, and kzhash can't tell. What can you do with this? Morph a file as it traverses the network; have an installation executable describe the systems its being installed on as it propogates through a network. With a fairly large installer, you'd get quite a few bits in there.
You still don't get to do random noise, and while it's no Tiger Tree, kzhashing doesn't appear so exploitable that this group is likely to have anything. I could be wrong, but then, virtual algorithm? Right.
Re:Already done (Score:5, Informative)
Re:Already done (Score:5, Informative)
Joe Sixpack may not look at hashes, but his P2P software probably does. I know aMule uses the hash to match files that have had their names changed.
~Rebecca