In 2000, I wrote a Linux device driver that “decrypted” the output of a certain device, and my company, which hosted open-source projects, agreed to host it.

The “encryption” was only a XOR, but that was enough for the maker of said device to sue my company under 17 U.S.C. § 1201 for hundreds of millions in damages.

The story got a lot of press back then because it highlighted how stupid the then-new DMCA was, and also because there was a David open-source enthusiasts vs. Goliath heartless corporation flavor to it.

Our lawyer decided to pick up the fight to generate free publicity for our fledgling company. For discovery, the maker of the device requested “a copy of any and all potentially infringing source code”. They weren’t specific and they didn’t specify the medium.

So we printed the entire Linux kernel source code including my driver in 5-pt font and sent them the boxes of printouts. Legally they had been served, so there was nothing they could do about it.

  • a1studmuffin 🇦🇺@aussie.zone
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I’d love to hear more about this - do you do it professionally (for preventative reasons), as a side hobby, or as an attacker for malicious/selfish reasons? No judgement, genuinely curious as it takes a certain personality type to do this kind of work and I find it really interesting.

    • Ret2libsanity@infosec.pub
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Professionally

      My title is senior vulnerability researcher. Focus on mobile devices. That’s all I can really say without doxing too much

      But the Linux kernel is always a juicy target because of the coverage and exploit there gets you.

      • crbn@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        Neat. Why is Linux kernel relevant for many mobile users? Is iPhone built off of it the same way Mac OS is?

        What do you mean by coverage and exploit?

        • SwingingTheLamp@midwest.social
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          MacOS and iOS have Darwin as their base, which is really a mutt. Apple started with the NeXTSTEP kernel, which was a mix of 4.3BSD and Mach, then folded in some FreeBSD, other open source components, and some in-house code.

          It’s Android that uses the Linux kernel as its base, and the millions of phones makes it a juicy target.

          • crbn@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            arrow-down
            1
            ·
            1 year ago

            Not too surprising that iOS has linux in its DNA, but never realized Android does too. Always assumed it was more windows-based. Good to know.

    • ngdev@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      I think they just stare at it, hoping the vulnerabilities come to them in a moment of revelation. A Linux Joseph Smith, the kernel playing the part of the Golden Plates.