Here we go again - ISP DPI, but is it interception?

Wendy M. Grossman wendyg at pelicancrossing.net
Fri Jul 30 15:56:20 BST 2010


Brian Morrison wrote:
> On Fri, 30 Jul 2010 11:39:02 +0100
> Nicholas Bohm <nbohm at ernest.net> wrote:
> 
>> Clive D.W. Feather wrote:
>>> Charles Lindsey said:
>>>   
>>>> Once they have a list of addresses of sites, they they are
>>>> perfectly entitled to visit those sites (as is anybody else) and
>>>> to probe them for malware.
>>>>     
>>> No they aren't. You may recall that, a couple of years ago, someone
>>> was convicted of computer misuse because he probed a site for
>>> malware - to be precise, he put "/.." on an URL.
>> Useful point: do you have a reference?
> 
> Dan Cuthbert. He was trying to make a donation to a Tsunami relief
> charity web site and noted that the site was very slow and thought
> perhaps he might be being phished, so he truncated the URL back to just
> the host name. He was prosecuted for purely that action, possibly
> because as an IT professional the police thought he should realise that
> such an action would be unauthorised.
> 

How did they find out? I think we've all often done that kind of thing.

wg



More information about the ukcrypto mailing list