Case File
efta-efta01001876DOJ Data Set 9OtherFrom: Joichi Ito <Ma>
Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta01001876
Pages
2
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Joichi Ito <Ma>
To: Jeffrey Epstein <jeevacation®gmail.com>
Subject: Fwd: [IP] How Splitting a Computer Into Multiple Realities Can Protect You From Hackers
Date: Thu, 20 Nov 2014 20:25:48 +0000
Cool
Sent from my iPhone
Begin forwarded message:
From: "Dave Farber via if <
Date: November 20, 2014 at 15:14:19 EST
To: "ip"
Subject: UPI How Splitting a Computer Into Multiple Realities Can Protect You From Hackers
Reply-To: [email protected]
Forwarded message
From: "Dewayne Hendricks"
Date: Nov 20, 2014 3:06 PM
Subject: [Dewayne-Net] How Splitting a Computer Into Multiple Realities Can Protect You From Hackers
To: "Multiple recipients of Dewayne-Net"
Cc:
HOW SPLITTING A COMPUTER INTO MULTIPLE REALITIES CAN PROTECT YOU FROM HACKERS
By ANDY GREENBERG
Nov 20 2014
Eight years ago, polish hacker Joanna Rutkowska was experimenting with rootkits—tough-to-detect spyware
that infects the deepest level of a computer's operating system—when she came up with a devious notion:
What if, instead of putting spyware inside a victim's computer, you put the victim's computer inside the
spyware?
At the time, a technology known as virtualization was becoming easier to implement on PCs, allowing anyone
to create a miniature operating system, known as a virtual machine, inside their main operating system.
Rutkowska manipulated virtualization into a mind-contorting weapon called a Blue Pill attack. Without them
knowing, her rootkit moved the victim's entire OS into a virtual machine controlled by the hacker, allowing
everything the target did to be watched. The victim's digital world would suddenly exist inside an alternate
reality, and no amount of antivirus or antirootkit scanning could break the system out of that aquarium. "Your
operating system swallows the Blue Pill and it awakes inside the Matrix," Rutkowska wrote in a blog post
explaining the trick. Eventually she honed the maneuver so that not even launching another virtual machine
inside the Blue Pilled system would glitch the illusion—her attack supported a dream within a dream.
But as years passed, no real-world instances of Blue Pill attacks were discovered, even after other researchers
developed tests capable of detecting the technique. Rutkowska's explanation? For normal spies and
cybercriminals, ordinary rootkits work just fine. "There are still so many places in a Windows kernel to hide
traditional malware," she says. "I was as vulnerable as any other user. This was annoying."
EFTA01001876
So Rutkowska flipped the game, this time in favor of the defenders. Four years ago her Warsaw-based firm,
Invisible Things Lab, started developing its own operating system known as Qubes. The free open source OS
lets users set up a collection of virtual machines on their PC, with a simple central interface to manage each
quarantined system. Careful users can keep their personal online activities isolated in one virtual machine, for
instance, while they do their work in another, and their banking in a third. (Rutkowska typically runs about 15.)
Open a malicious email attachment or click on an infected website and the malware can't break out of that one
contaminated container.
If it works as promised, even NSA-level exploits would be contained to a single compartment in Qubes'
architecture, one that could be evaporated and re-created at will. Recovering from even the nastiest hacker
attack, in other words, could soon be as easy as waking from a bad dream.
Dewayne-Net RSS Feed:
Archives gi I Modify Your Subscription I Unsubscribe Now
; ; Powered by Listbox
EFTA01001877
Technical Artifacts (2)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Domain
gmail.comEmail
[email protected]Related Documents (6)
DOJ Data Set 10OtherUnknown
EFTA01682184
186p
DOJ Data Set 10OtherUnknown
EFTA01370863
1p
Dept. of JusticeOtherUnknown
Medical Record/Clinical Encounter: DOJ-OGR-00026334
This clinical encounter document from the Bureau of Prisons details a medical evaluation of Jeffrey Epstein on July 12, 2019. It covers his medical history, current complaints, and treatment, including discussions around his triglyceride levels, sleep apnea, and back pain. The document was generated by the treating physician at the Metropolitan Correctional Center in New York.
1p
DOJ Data Set 8CorrespondenceUnknown
EFTA00014087
0p
DOJ Data Set 11OtherUnknown
EFTA02367961
1p
DOJ Data Set 10OtherUnknown
EFTA01977826
2p
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.