Don't Copy Matrix Hacking, Warns Computer Society

from the calm-down... dept

Last week, plenty of attention was paid to the fact that in the (extraordinarily brief) scene in the new Matrix movie where the character Trinity is seen hacking a system, she is using actual hacking tools that are popular today. Most of the people talking about the story (and it got picked up by plenty of blogs) focused on how nice it was to see Hollywood actually pay attention to reality in the computing world for once. Now, however, comes the backlash. The British Computer Society is apparently worried that this snippet will encourage people to try to do similar hacks on their own and have put out a statement warning people not to copy the Matrix hacking scene, saying you might end up in jail. Come on! You know what? You probably shouldn't copy the fight scene in the park or the leaping through the window stuff, because you might end up dead.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    itchyfish, 22 May 2003 @ 1:56pm

    You'd like to think that

    You'd like to think that people would be intelligent enough not to repeat fantastic events seen on TV and in the movies. Alas, it's just no so. Johnny Knoxville got sued by some teens who barbecued themselves in trying to repeat his stunt. I absolutely guarantee plenty of morons will try this hack.

    link to this | view in thread ]

  2. identicon
    Oliver Wendell Jones, 22 May 2003 @ 2:04pm

    You know what?

    Within 2 minutes of leaving the theater where I had just seen Wargames, I had already coded 90% of a 'War-dialing' program.

    I doubt I'm the only computer geek in the world who can't wait to get home and emulate some realistic hack seen in a flick.

    link to this | view in thread ]

  3. icon
    Mike (profile), 22 May 2003 @ 2:42pm

    Re: You know what?

    The difference between the Wargames hack and the Matrix hack is that the hack in Wargames had a real purpose - a goal - that people could understand. In the Matrix, it was just a plot device to get past security. I don't think any hackers are going to copy this, just 'cause they saw it in the Matrix.

    link to this | view in thread ]

  4. identicon
    LittleW0lf, 22 May 2003 @ 5:27pm

    Threats and Vulnerabilities and Exploits, Oh My

    It never seems to amaze me how stupid some of these computer societies (or any other technical society) can be...warning the world not to do something is sure to cause more people to do it. Especially when computer crime is one of the least prosecuted crimes, it seems like prosecutors have to throw the book at folks to make an example of them, because they are likely not to throw the book at everyone.

    The funny thing about their advice, and most folks advice in this manner, is that running the sshd exploit is not always illegal. In a matter of fact, I've run the sshd exploit numerous times, and have never once had to worry about the feds cracking through my door. I run the exploit against my own hardware, my own operating systems, on a non-Internet connected network run by me using my own hardware. This, along with many other exploits I am testing out in order to figure out ways to securely run services and defeat attacks.

    Furthermore, advice like this actually stands to harm administrators, who don't realize that they can use "safe" exploits to test their systems for vulnerabilities. I hear folks all the time saying they would never run exploits against their own machines to test security, yet my real servers have never been exploited, and their's have, likely because they haven't taken the time to figure out what the problem is and how to fix it like I have. Yet folks still point to what I do as being either illegal (it isn't) or unethical (how?).

    No, you shouldn't run these exploits against systems you do not have a legitimate reason for attacking, but this blanket "do not hack" attitude has to stop for the benefit of society.

    link to this | view in thread ]

  5. identicon
    Anonymous Coward, 22 May 2003 @ 9:03pm

    Re: Threats and Vulnerabilities and Exploits, Oh M

    It's a film people, how many of you have patched the SSHNuke exploit?

    I was impressed with the care and detail which that scene was filmed

    link to this | view in thread ]

  6. identicon
    Anonymous Coward, 22 May 2003 @ 9:04pm

    Re: Threats and Vulnerabilities and Exploits, Oh M

    It's a movie, people, how many of you have patched the "SSHNuke" exploit?

    I WAS impressed with the care and detail with which that scene was filmed.

    link to this | view in thread ]

  7. identicon
    exman, 23 May 2003 @ 12:34am

    Re: Threats and Vulnerabilities and Exploits, Oh M

    The BCS are a shower of wankers who need all the publicity they can get. Just ognore them.

    link to this | view in thread ]

  8. identicon
    The One, 27 May 2003 @ 3:04pm

    Re: Threats and Vulnerabilities and Exploits, Oh M

    duh... there aint no such a tool called "sshnuke", it's fictional.

    link to this | view in thread ]

  9. identicon
    Rob Zilla, 7 Aug 2003 @ 2:38am

    Re: Threats and Vulnerabilities and Exploits, Oh M

    The One: shame matrix.com is a hairstyles website, nothing to do with the matrix.

    and sshnuke is a real exploit, it was an exploit in SSH 1 only, and was fixed as soon as SSH 2 was released.

    link to this | view in thread ]

  10. identicon
    anon, 20 Aug 2003 @ 10:19pm

    How could she use that vulnerability

    The version of NMap that Trinity used and the ssh exploit were both released on 2001.
    The first Matrix movie was set up in 1999 and in Reloaded, Morpheus says that in the last six months (since Neo joined them) they have freed many more minds than before. So reloaded is set up at best in mid 2000.
    How could trinity use a nonexistent tool with an unknown vulnerability?
    OK, maybe trinity is the best cracker of them-all (according to the first movie she is one of the best) and she knew the SSH v1 vulnerability and she developed the sshnuke program herself, but how could she use Nmap 2.54 beta?

    link to this | view in thread ]

  11. identicon
    MonkeyC, 30 Aug 2003 @ 10:01pm

    Uhm,


    Keep in mind, that it is only 2000 within the Matrix. The hacking tools are brought into the Matrix with them. So she brought tools applicable to the current technology back then, despite the fact that, within the program, they had not been created yet.

    Just like how they are flying around in a hover-craft, even though they have not been invented yet.

    Nuff said.

    link to this | view in thread ]

  12. identicon
    b0d13, 8 Sep 2003 @ 6:17am

    Re: Threats and Vulnerabilities and Exploits, Oh M

    link to this | view in thread ]

  13. identicon
    Fo, 4 Oct 2003 @ 4:33pm

    ssh nuke...

    and let me guess... i have to run it in my console ? show me why i dont have to think that is the concocted code which will blow my system off.... the net ];> ?

    link to this | view in thread ]

  14. identicon
    AfterStep, 29 Dec 2003 @ 12:45pm

    Re: How could she use that vulnerability

    matrix ins't in the year 2k, it's in next time...
    sshnuke was coded in 2001
    :DDD

    link to this | view in thread ]

  15. identicon
    SALMAN, 7 Aug 2012 @ 5:34am

    i wnt 2 become a hacker

    how i can become give some tips

    link to this | view in thread ]

  16. identicon
    ghb3775, 5 May 2015 @ 6:39pm

    whatash** some things nmap, etc

    This post is from 2003. Wow. Hhuhuua how worried people were into a discution .. just for some -O in nmap and som commands in sshnuke. This things are the cut from the cut scene, because nmap was in it's earliest version inside movie. and... that was awesome....

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.