Featured Articles

Snapdragon 400 is Qualcomm’s SoC for watches, wearables

Snapdragon 400 is Qualcomm’s SoC for watches, wearables

We wanted to learn a bit more about Qualcomm's plans for wearables and it turns out that the company believes its…

More...
Qualcomm sampling 20nm Snapdragon 810

Qualcomm sampling 20nm Snapdragon 810

We had a chance to talk to Michelle Leyden-Li, Senior Director of Marketing, QCT at Qualcomm and get an update on…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 18 August 2008 10:39

MIT three still muzzled

Written by Nick Farell

Image

Gagging order in place


Three college
students who discovered a way to hack into the Boston subway system's payment cards and add hundreds of dollars in value to them were ordered by a court to shut up about it.

A federal judge in Boston kept in place a temporary restraining order preventing the Massachusetts Institute of Technology students Zack Anderson, R.J. Ryan and Alessandro Chiesa from spilling the beans about the security holes they found. Next week a judge will decide if the restraining order should be lifted altogether or modified to cover only "nonpublic" information.  This is because details of the hack have already been made public on the internet.

The Boston Transport Authority sued the students and won a restraining order after the agency said it needed time to fix the problems. Judge George O'Toole Jr. also ordered the students Thursday to turn over more information about their findings, including a report they submitted to their professor,  cryptography pioneer Ronald Rivest,  and computer code they planned to release as part of their presentation.

The students argue they gave the transit agency shedloads of time to sort out their flaccid security before the talk and anyway they were going to keep secret the details of how they cracked a key security feature that protects against some of the breaches they describe.
Last modified on Tuesday, 19 August 2008 04:20

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments