<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Emerald Viewer Login Screen Sneak DDOS Attack?</title>
	<atom:link href="http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/feed" rel="self" type="application/rss+xml" />
	<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html</link>
	<description>Always Fairly Unbalanced</description>
	<lastBuildDate>Tue, 04 Oct 2016 13:18:56 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: geniusthemaster</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-64624</link>
		<dc:creator>geniusthemaster</dc:creator>
		<pubDate>Tue, 21 Sep 2010 08:11:37 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-64624</guid>
		<description>well ive ive given some insight to the situation here we go again. this sort was a 4chan coo  co-op with pn.org( or whats left of them after we fragged the living daylights out of there servers... etc :)

and those lindens you see before you, are mostly anarchists, and a very large percent of slackers. the remainder are just secretely pn.org spies so as to leak data to the masses. flapping lips sinks titanic ships? we all know it was lindens fault in the first place for not treating as it truly should be at first, a game, a new toy to be played with. when u wrile hackers and anarchists up over nothing and impose laws with weak security. thats asking for it. end of line.</description>
		<content:encoded><![CDATA[<p>well ive ive given some insight to the situation here we go again. this sort was a 4chan coo  co-op with pn.org( or whats left of them after we fragged the living daylights out of there servers&#8230; etc <img src='http://alphavilleherald.com/site/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>and those lindens you see before you, are mostly anarchists, and a very large percent of slackers. the remainder are just secretely pn.org spies so as to leak data to the masses. flapping lips sinks titanic ships? we all know it was lindens fault in the first place for not treating as it truly should be at first, a game, a new toy to be played with. when u wrile hackers and anarchists up over nothing and impose laws with weak security. thats asking for it. end of line.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emerald Gang Implodes &#8211; Viewer Ban Hammer Next? &#124; The Alphaville Herald</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63650</link>
		<dc:creator>Emerald Gang Implodes &#8211; Viewer Ban Hammer Next? &#124; The Alphaville Herald</dc:creator>
		<pubDate>Wed, 01 Sep 2010 22:08:31 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63650</guid>
		<description>[...] Emerald gang has been plagued by accusations they were responsible for a DDoS attack on a critic&#8217;s web site, revelations of leaking user-identifiable information, high profile [...]</description>
		<content:encoded><![CDATA[<p>[...] Emerald gang has been plagued by accusations they were responsible for a DDoS attack on a critic&rsquo;s web site, revelations of leaking user-identifiable information, high profile [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: SL recap of August 2010 &#171; Daniel Voyager&#39;s Blog</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63508</link>
		<dc:creator>SL recap of August 2010 &#171; Daniel Voyager&#39;s Blog</dc:creator>
		<pubDate>Mon, 30 Aug 2010 17:54:27 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63508</guid>
		<description>[...] Emerald Viewer DDOS Attack - 20th August [...]</description>
		<content:encoded><![CDATA[<p>[...] Emerald Viewer DDOS Attack &#8211; 20th August [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Judge Joker</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63430</link>
		<dc:creator>Judge Joker</dc:creator>
		<pubDate>Sun, 29 Aug 2010 11:10:27 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63430</guid>
		<description>@Dave Bell

&quot;I don’t think I want to use web-on-a-prim&quot;

If people are still under the impression Emerald is a singular furrie issue, The technical term would be &quot;fap-on-a-prim&quot;.</description>
		<content:encoded><![CDATA[<p>@Dave Bell</p>
<p>&#8220;I don’t think I want to use web-on-a-prim&#8221;</p>
<p>If people are still under the impression Emerald is a singular furrie issue, The technical term would be &#8220;fap-on-a-prim&#8221;.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dave Bell</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63428</link>
		<dc:creator>Dave Bell</dc:creator>
		<pubDate>Sun, 29 Aug 2010 07:56:47 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63428</guid>
		<description>I don&#039;t think I want to use web-on-a-prim.</description>
		<content:encoded><![CDATA[<p>I don&#8217;t think I want to use web-on-a-prim.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Nelson Jenkins</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63427</link>
		<dc:creator>Nelson Jenkins</dc:creator>
		<pubDate>Sun, 29 Aug 2010 07:26:02 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63427</guid>
		<description>@ Dave Bell

Technically it&#039;s possible that it was an oversight, but if it was, it&#039;s still something that you would expect only from a complete amateur, not from the professionals the Emerald team wants us to think they are. That&#039;s like if a Windows update simply used old files on the basis that they were already in the system32 folder, so why bother checking them?

And yes, it would be a VERY interesting concept if someone ripped the xxkdu.dll and wrote up some sort of drive-by-download hooked into the Emerald login page, which would turn every single Emerald client into a total mess. (I wouldn&#039;t go with negative though... maybe replace everything with child porn or something? Not that I have any.) (Yes, that is a joke, albeit a bad one.)

The fact remains, they&#039;re leaving the xxkdu.dll functionality in the viewer, so obviously they&#039;re just tempting people to download emkdu.dll and install it manually, because they think it somehow doesn&#039;t violate the terms LL set forth, as Phox did:
http://emeraldscandal.wordpress.com/2010/08/28/phox-instructs-user-to-re-install-emkdu-dll/</description>
		<content:encoded><![CDATA[<p>@ Dave Bell</p>
<p>Technically it&#8217;s possible that it was an oversight, but if it was, it&#8217;s still something that you would expect only from a complete amateur, not from the professionals the Emerald team wants us to think they are. That&#8217;s like if a Windows update simply used old files on the basis that they were already in the system32 folder, so why bother checking them?</p>
<p>And yes, it would be a VERY interesting concept if someone ripped the xxkdu.dll and wrote up some sort of drive-by-download hooked into the Emerald login page, which would turn every single Emerald client into a total mess. (I wouldn&#8217;t go with negative though&#8230; maybe replace everything with child porn or something? Not that I have any.) (Yes, that is a joke, albeit a bad one.)</p>
<p>The fact remains, they&#8217;re leaving the xxkdu.dll functionality in the viewer, so obviously they&#8217;re just tempting people to download emkdu.dll and install it manually, because they think it somehow doesn&#8217;t violate the terms LL set forth, as Phox did:<br />
<a href="http://emeraldscandal.wordpress.com/2010/08/28/phox-instructs-user-to-re-install-emkdu-dll/" rel="nofollow">http://emeraldscandal.wordpress.com/2010/08/28/phox-instructs-user-to-re-install-emkdu-dll/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dave Bell</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63426</link>
		<dc:creator>Dave Bell</dc:creator>
		<pubDate>Sun, 29 Aug 2010 07:19:26 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63426</guid>
		<description>There&#039;s a new Emerald Beta out, but there was a flame war going on in group IM about how it apparently still installed emkdu.dll, this time with Jessica blaming Windows for recovering it from a Temp folder.

Ouch! If that&#039;s true, there&#039;s no guarantee that it isn&#039;t a hacked version of the Kakadu library. Was there some deliberately sneaky code in the installer that left this Temp folder intact when Emerald was uninstalled, with lurking &quot;bad&quot; code.

In any case, this is why it is a dreadful idea for Emerald to look for an &quot;emkdu.dll&quot;. If it can use &quot;llkdu.dll&quot;, fair enough. If the code is looking for a wildcarded filename, &quot;??kdu.dll&quot;, or there&#039;s a list with &quot;emkdu,dll&quot; still in it, they&#039;re asking for trouble. (No, I don;t know how to write an &quot;aakdu.dll&quot; which opens JPEG files with the colurs changed to a photographic negative.)

I found the Temp/emerald/ folder in my system. Why did a SecondLife.exe get left in it? This little business is beginning to look as straight as a three-dollar bill.</description>
		<content:encoded><![CDATA[<p>There&#8217;s a new Emerald Beta out, but there was a flame war going on in group IM about how it apparently still installed emkdu.dll, this time with Jessica blaming Windows for recovering it from a Temp folder.</p>
<p>Ouch! If that&#8217;s true, there&#8217;s no guarantee that it isn&#8217;t a hacked version of the Kakadu library. Was there some deliberately sneaky code in the installer that left this Temp folder intact when Emerald was uninstalled, with lurking &#8220;bad&#8221; code.</p>
<p>In any case, this is why it is a dreadful idea for Emerald to look for an &#8220;emkdu.dll&#8221;. If it can use &#8220;llkdu.dll&#8221;, fair enough. If the code is looking for a wildcarded filename, &#8220;??kdu.dll&#8221;, or there&#8217;s a list with &#8220;emkdu,dll&#8221; still in it, they&#8217;re asking for trouble. (No, I don;t know how to write an &#8220;aakdu.dll&#8221; which opens JPEG files with the colurs changed to a photographic negative.)</p>
<p>I found the Temp/emerald/ folder in my system. Why did a SecondLife.exe get left in it? This little business is beginning to look as straight as a three-dollar bill.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Kiddoh</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63425</link>
		<dc:creator>Kiddoh</dc:creator>
		<pubDate>Sun, 29 Aug 2010 07:12:26 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63425</guid>
		<description>Oioi~ Emerald, emerald... It really dumbfounds me, this logic of theirs. :&lt;</description>
		<content:encoded><![CDATA[<p>Oioi~ Emerald, emerald&#8230; It really dumbfounds me, this logic of theirs. :&lt;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: General Drama</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63424</link>
		<dc:creator>General Drama</dc:creator>
		<pubDate>Sun, 29 Aug 2010 06:23:38 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63424</guid>
		<description>Nice report Nelson. Really folks, who is still deluded into thinking the Emerald team isn&#039;t still up to no damn good?</description>
		<content:encoded><![CDATA[<p>Nice report Nelson. Really folks, who is still deluded into thinking the Emerald team isn&#8217;t still up to no damn good?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Nelson Jenkins</title>
		<link>http://alphavilleherald.com/2010/08/emerald-viewer-login-screen-sneak-ddos-attack.html/comment-page-3#comment-63423</link>
		<dc:creator>Nelson Jenkins</dc:creator>
		<pubDate>Sun, 29 Aug 2010 05:56:13 +0000</pubDate>
		<guid isPermaLink="false">http://alphavilleherald.com/?p=4219#comment-63423</guid>
		<description>@ TOBSDA (well, actually, to anyone who doesn&#039;t want to watch the whole hour of footage he just posted)

Here&#039;s a summary, taken from http://emeraldscandal.wordpress.com/2010/08/28/after-hours-emerald-qa-videos/

The basics: most of the developers are now focusing on a v2 derivative (… hooray?), LGG is slightly apologetic, and Arabella happened to be AFK for most of the session, which wasn’t a bad thing because some serious Arabella-bashing went on. Jessica hosted most of the interview.

Some fun facts:

    * Jessica claims that the emkdu.dll fiasco was being resolved internally, even though it wasn’t for 6 months. There were a few tough comments that this should have been made public, which were mostly ignored.
    * Jessica continues to blame LGG for Emerald’s recent downfall – not the actions of the malicious devs. When told how it wasn’t LGG’s fault, she responded with “fair enough” and changed the subject.
    * LGG confirms that anyone can add malicious code into the binaries, despite the use of MD5 checksums (as they could just post the MD5 checksum from the binary itself). Jessica confirms that either she or Arabella will create the checksums.
    * Emerald will continue to use OTR (even though for most users it causes nothing but problems).
    * Emerald will continue to provide functionality for using xxkdu.dll, however, it won’t be including it in the installer. (Why this functionality will remain in Emerald is anyone’s guess.)
    * Jessica states: “As far as malicious code, I don’t know of any malicious code that Phox has done in Emerald specifically… the datamining stuff was not part of Emerald… the DDoS wasn’t even part of code, per se, it was done on an HTML page.”
    * A humorous Emerald fanboy pointed out that “every company” performs datamining, even Linden Lab – except he pointed out that the license agreement forces you to give them permission to mine data. (Note: Emerald doesn’t tell you that they mine data, nor do they require you to give them permission to do so.) “It’s not like this was a big major scandal.” The same user goes on to ridicule himself even further by claiming the FBI would be taking down Emerald if they were looking to find real life identities (they were, but the FBI was generally disinterested as they, unfortunately, have more pressing matters), laughingly stating “I work in the security field, I know what I’m talkin’ about when it comes to private protection and people getting arrested for computer crimes,” drowning out the person who had the floor asking a question. Apparently, he confuses “somewhat justifiable datamining for company use” with “malicious exploitative datamining for private use”.
    * Jessica confuses Google Analytics (geolocation, IP address, etc. that can be blocked through NoScript) with datamining using a QuickTime exploit through Second Life (that generally can’t be blocked).
    * Jessica also agrees that open-source viewers with public code shouldn’t be sold for profit. (Logic!)
    * One commentator wishes for people to use the Emerald source code to create “copybot” viewers to legitimately download items for archival and modification purposes (i.e. downloading a skin, touching it up, and re-uploading). Two problems with this: first, such viewers already exist, and second, they are much, much more often used as illegitimate copybot viewers. However, he does point out that switching to the LGPL license will make this more common and may be a problem. (The self-proclaimed “security expert” also manages to bring in a teen grid argument, pointing out that over 80% of items on the teen grid are copybotted, derailing the conversation into a copybot argument.)
    * Jessica claims that Linden Lab was working on a server-side algorithm to detect copybotting (i.e. prim creation timeframe flags, massive asset pulls, etc.), however, after the big layoff, the project apparently stalled. A commentator agrees with a bit more detail.
    * One commentator explains an asset theft exploit called “object injection”, basically tricking the sim into thinking the object is owned by you, which has not been patched yet. Some other commentators talk of “toasty” exploits, involving copybotting vendors instead of vendor contents, which were quickly patched. (At this point, the Q&amp;A has disintegrated into an unmoderated conversation about copybotting. Within a few minutes, everyone gives their last goodbyes and goes to have dinner.)</description>
		<content:encoded><![CDATA[<p>@ TOBSDA (well, actually, to anyone who doesn&#8217;t want to watch the whole hour of footage he just posted)</p>
<p>Here&#8217;s a summary, taken from <a href="http://emeraldscandal.wordpress.com/2010/08/28/after-hours-emerald-qa-videos/" rel="nofollow">http://emeraldscandal.wordpress.com/2010/08/28/after-hours-emerald-qa-videos/</a></p>
<p>The basics: most of the developers are now focusing on a v2 derivative (… hooray?), LGG is slightly apologetic, and Arabella happened to be AFK for most of the session, which wasn’t a bad thing because some serious Arabella-bashing went on. Jessica hosted most of the interview.</p>
<p>Some fun facts:</p>
<p>    * Jessica claims that the emkdu.dll fiasco was being resolved internally, even though it wasn’t for 6 months. There were a few tough comments that this should have been made public, which were mostly ignored.<br />
    * Jessica continues to blame LGG for Emerald’s recent downfall – not the actions of the malicious devs. When told how it wasn’t LGG’s fault, she responded with “fair enough” and changed the subject.<br />
    * LGG confirms that anyone can add malicious code into the binaries, despite the use of MD5 checksums (as they could just post the MD5 checksum from the binary itself). Jessica confirms that either she or Arabella will create the checksums.<br />
    * Emerald will continue to use OTR (even though for most users it causes nothing but problems).<br />
    * Emerald will continue to provide functionality for using xxkdu.dll, however, it won’t be including it in the installer. (Why this functionality will remain in Emerald is anyone’s guess.)<br />
    * Jessica states: “As far as malicious code, I don’t know of any malicious code that Phox has done in Emerald specifically… the datamining stuff was not part of Emerald… the DDoS wasn’t even part of code, per se, it was done on an HTML page.”<br />
    * A humorous Emerald fanboy pointed out that “every company” performs datamining, even Linden Lab – except he pointed out that the license agreement forces you to give them permission to mine data. (Note: Emerald doesn’t tell you that they mine data, nor do they require you to give them permission to do so.) “It’s not like this was a big major scandal.” The same user goes on to ridicule himself even further by claiming the FBI would be taking down Emerald if they were looking to find real life identities (they were, but the FBI was generally disinterested as they, unfortunately, have more pressing matters), laughingly stating “I work in the security field, I know what I’m talkin’ about when it comes to private protection and people getting arrested for computer crimes,” drowning out the person who had the floor asking a question. Apparently, he confuses “somewhat justifiable datamining for company use” with “malicious exploitative datamining for private use”.<br />
    * Jessica confuses Google Analytics (geolocation, IP address, etc. that can be blocked through NoScript) with datamining using a QuickTime exploit through Second Life (that generally can’t be blocked).<br />
    * Jessica also agrees that open-source viewers with public code shouldn’t be sold for profit. (Logic!)<br />
    * One commentator wishes for people to use the Emerald source code to create “copybot” viewers to legitimately download items for archival and modification purposes (i.e. downloading a skin, touching it up, and re-uploading). Two problems with this: first, such viewers already exist, and second, they are much, much more often used as illegitimate copybot viewers. However, he does point out that switching to the LGPL license will make this more common and may be a problem. (The self-proclaimed “security expert” also manages to bring in a teen grid argument, pointing out that over 80% of items on the teen grid are copybotted, derailing the conversation into a copybot argument.)<br />
    * Jessica claims that Linden Lab was working on a server-side algorithm to detect copybotting (i.e. prim creation timeframe flags, massive asset pulls, etc.), however, after the big layoff, the project apparently stalled. A commentator agrees with a bit more detail.<br />
    * One commentator explains an asset theft exploit called “object injection”, basically tricking the sim into thinking the object is owned by you, which has not been patched yet. Some other commentators talk of “toasty” exploits, involving copybotting vendors instead of vendor contents, which were quickly patched. (At this point, the Q&amp;A has disintegrated into an unmoderated conversation about copybotting. Within a few minutes, everyone gives their last goodbyes and goes to have dinner.)</p>
]]></content:encoded>
	</item>
</channel>
</rss>

