Featured Articles

HP Stream is a Chromebook killer priced at $200

HP Stream is a Chromebook killer priced at $200

We have been hearing reports of a new breed of affordable Windows notebooks for months. It is alleged that a number…

More...
AMD Radeon R7 SSD line-up goes official

AMD Radeon R7 SSD line-up goes official

AMD has officially launched its first ever SSDs and all three are part of AMD’s AMD Radeon R7 SSD series.

More...
KitKat has more than a fifth of Android users

KitKat has more than a fifth of Android users

Android 4.4 is now running on more than a fifth of Android devices, according to Google’s latest figures.

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 18 August 2008 10:39

MIT three still muzzled

Written by Nick Farell

Image

Gagging order in place


Three college
students who discovered a way to hack into the Boston subway system's payment cards and add hundreds of dollars in value to them were ordered by a court to shut up about it.

A federal judge in Boston kept in place a temporary restraining order preventing the Massachusetts Institute of Technology students Zack Anderson, R.J. Ryan and Alessandro Chiesa from spilling the beans about the security holes they found. Next week a judge will decide if the restraining order should be lifted altogether or modified to cover only "nonpublic" information.  This is because details of the hack have already been made public on the internet.

The Boston Transport Authority sued the students and won a restraining order after the agency said it needed time to fix the problems. Judge George O'Toole Jr. also ordered the students Thursday to turn over more information about their findings, including a report they submitted to their professor,  cryptography pioneer Ronald Rivest,  and computer code they planned to release as part of their presentation.

The students argue they gave the transit agency shedloads of time to sort out their flaccid security before the talk and anyway they were going to keep secret the details of how they cracked a key security feature that protects against some of the breaches they describe.
Last modified on Tuesday, 19 August 2008 04:20

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments