[Infowarrior] - Hadopi Router
Richard Forno
rforno at infowarrior.org
Fri Jul 10 12:34:14 UTC 2009
http://torrentfreak.com/hackers-undermine-piracy-evidence-with-hadopi-router-090709/
Hackers Undermine Piracy Evidence With Hadopi Router
Yesterday we reported that a provision in the revamped French “3
strikes” bill will allow for the punishment of ISP account holders for
the copyright infringing actions of others. Now a group of hackers has
set out to compromise WiFi routers en masse, in order to create an
environment of plausible deniability.
It seems that one way or another President Sarkozy is determined to
bring a “3 strikes” regime to France. After underlining his
determination during an historic speech to parliament in June,
yesterday saw a revised bill accepted by the Senate.
Aside from punishing actual file-sharers, the bill allows the courts
to take measures against people who have done no sharing, but are
accused simply because they are the one paying the ISP bill. If the
court decides that an account holder is guilty of “negligence” - by
somehow allowing others to file-share on their connection - it is
within a judge’s power to issue a fine up to 1,500 euros along with a
4 week disconnection.
Now, according to Le Monde, some French hackers have come together to
throw confusion into the mix, so that punishing these individuals is
not a straightforward or guaranteed accurate procedure.
A hacker known only as ‘N’ says he has developed some software known
as ‘Hadopi Router’, a term first penned by bloggers who devised the
concept. ‘N’, who is said to have previously worked manufacturing
routers, says he and a few friends wrote ‘Hadopi Router’ in order to
prove that the evidence gathered by the Hadopi agency is unreliable.
“It locates Wi-Fi networks in the neighborhood, then begins to crack
all their passwords,” says ‘N’. “Once we have the keys, we can create
a virtual access point,” which in basic terms means using the Internet
connection without the account holder’s knowledge.
‘N’ says that if an ‘owned’ router has its password changed, the
system automatically switches to another Wi-Fi signal in the
neighborhood and starts to attack the new password.
Additionally, ‘N’ claims that with Hadopi Router it is possible to
monitor activity on the cracked networks but one of his accomplices
called ‘V’ says they have no bad intentions.
“We just want to release our software and allow everyone to understand
that the technical data used by the Hadopi agency to accuse people
will not be reliable. Because of us, the judges will not be able to
say that they weren’t aware of that.”
‘N’ says he is already imagining a more ambitious strategy to
distribute many dozens of modified routers to a community in order to
create a “mini-network”, superimposed over existing ones.
Of course, many wireless routers already have either a complete lack
of security or weak WEP encryption enabled, making them sitting ducks
for drive-by infringements or less casual ones conducted by neighbors
within range.
An IP address does not necessarily identify an individual, in fact one
could argue that in many instances these days it doesn’t even identify
a computer but merely a gateway to a sub network, behind which could
be any number of individuals not linked in any way to a bill payer.
Time will tell how French judges will rule in these “negligence”
cases, especially when they have just 5 minutes to do so.
More information about the Infowarrior
mailing list