[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: RSA-130 Falls to NFS - Lenstra Posting to sci.crypt.research




>
>On Mon, 15 Apr 1996, Vladimir Z. Nuri wrote:
>
>> I have been wondering about malicious hackers getting into these
>> pools. would it be possible for them to contribute false data
>> that screws up the end results? or are such anomalies easily
>> discarded or disregarded by the final processes?
>
>> future implementors of these programs might amuse themselves with
>> trying to create such safeguards or anticipate such "attacks" which
>> are pretty significant the more the processes become distributed.
>
>    I guess I would have to ask you why you think hackers would be 
>interested in these projects in the first place?  Your typical hacker 
>would care very little about such a project and in fact may be interested 
>in seeing it succeed.  

the malicious type of hacker has the psychology of taking
great glee in tearing anything meaningful down. they don't
necessarily need a plausible reason. the purpose of destruction
alone can be a powerful motivating force. those who destroy
carefully constructed things for fun obtain a sense of power from it.

>    However, I do feel that you may have a valid point when switching 
>"hackers" to "opponents of the research."  Anyone with an interest in 
>preventing or slowing down the progress in such a project would be more 
>dangerous in my mind than your average hacker.  

the point is, when you are sharing your project among a lot of 
elements "out there" on a network, you have to worry more and 
more about "safe computing". when you are working on a purely
voluntary basis, what is your guarantee that everyone who volunteers
is actually on your side? again, a bigger problem the more a 
task is decentralized. one interesting argument in favor of centralized 
computing (I'm not saying it is a definitive argument, quite far
from that of course-- just pointing out that Distribution is
not necessarily the Panacea to All Problems).