Bücher online kostenlos Kostenlos Online Lesen

Little Brother

Titel: Little Brother Kostenlos Bücher Online Lesen
Autoren: Cory Doctorow
Vom Netzwerk:
or in doubt, run in circles, scream and shout
    > .
    250 2.0.0 k5SMW0xQ006174 Message accepted for delivery
    QUIT
    221 2.0.0 mail.pirateparty.org.se closing connection
    Connection closed by foreign host.
    This conversation's grammar was defined in 1982 by Jon Postel, one of the Internet's heroic forefathers, who used to literally run the most important servers on the net under his desk at the University of Southern California, back in the paleolithic era.
    Now, imagine that you hooked up a mail-server to an IM session. You could send an IM to the server that said "HELO littlebrother.com.se" and it would reply with "250 mail.pirateparty.org.se Hello mail.pirateparty.org.se, pleased to meet you." In other words, you could have the same conversation over IM as you do over SMTP. With the right tweaks, the whole mail-server business could take place inside of a chat. Or a web-session. Or anything else.
    This is called "tunneling." You put the SMTP inside a chat "tunnel." You could then put the chat back into an SMTP tunnel if you wanted to be really weird, tunneling the tunnel in another tunnel.
    In fact, every Internet protocol is susceptible to this process. It's cool, because it means that if you're on a network with only Web access, you can tunnel your mail over it. You can tunnel your favorite P2P over it. You can even tunnel Xnet — which itself is a tunnel for dozens of protocols — over it.
    Domain Name Service is an interesting and ancient Internet protocol, dating back to 1983. It's the way that your computer converts a computer's name — like pirateparty.org.se — to the IP number that computers actually use to talk to each other over the net, like 204.11.50.136. It generally works like magic, even though it's got millions of moving parts — every ISP runs a DNS server, as do most governments and lots of private operators. These DNS boxes all talk to each other all the time, making and filling requests to each other so no matter how obscure the name is you feed to your computer, it will be able to turn it into a number.
    Before DNS, there was the HOSTS file. Believe it or not, this was a single document that listed the name and address of every single computer connected to the Internet. Every computer had a copy of it. This file was eventually too big to move around, so DNS was invented, and ran on a server that used to live under Jon Postel's desk. If the cleaners knocked out the plug, the entire Internet lost its ability to find itself. Seriously.
    The thing about DNS today is that it's everywhere. Every network has a DNS server living on it, and all of those servers are configured to talk to each other and to random people all over the Internet.
    What Masha had done was figure out a way to tunnel a video-streaming system over DNS. She was breaking up the video into billions of pieces and hiding each of them in a normal message to a DNS server. By running her code, I was able to pull the video from all those DNS servers, all over the Internet, at incredible speed. It must have looked bizarre on the network histograms, like I was looking up the address of every computer in the world.
    But it had two advantages I appreciated at once: I was able to get the video with blinding speed — as soon as I clicked the first link, I started to receive full-screen pictures, without any jitter or stuttering — and I had no idea where it was hosted. It was totally anonymous.
    At first I didn't even clock the content of the video. I was totally floored by the cleverness of this hack. Streaming video from DNS? That was so smart and weird, it was practically perverted .
    Gradually, what I was seeing began to sink in.
    It was a board-room table in a small room with a mirror down one wall. I knew that room. I'd sat in that room, while Severe-Haircut woman had made me speak my password aloud. There were five comfortable chairs around the table, each with a comfortable person, all in DHS uniform. I recognized Major General Graeme Sutherland, the DHS Bay Area commander, along with Severe Haircut. The others were new to me. They all watched a video screen at the end of the table, on which there was an infinitely more familiar face.
    Kurt Rooney was known nationally as the President's chief strategist, the man who returned the party for its third term, and who was steaming towards a fourth. They called him "Ruthless" and I'd seen a news report once about how tight a rein he kept his staffers on, calling them, IMing them,

Weitere Kostenlose Bücher