Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - authornothacker

Pages: [1]
1
General discussion / Re: author looking for hacking info
« on: December 10, 2014, 05:25:35 pm »
Big yes on Neal Stephenson though I thought Cryptonomicon was much better than Snow Crash.  William Gibson is another.  However, despite my technical  questions, the story is not primarily about hacking.  Our group will get embroiled in a mystery that plays out in large part online (indeed, they think it is just an alternate reality game) but I want to show that whoever is behind this mystery is technically very sophisticated.  I don't want to say a whole lot more than that about the plot though.


I don't know what the odds are of my getting published, but evilzone will be in the acknowledgments if that is acceptable.

2
General discussion / Re: author looking for hacking info
« on: December 10, 2014, 01:44:39 am »
Thank you for that reply and the links.  The bad guy will post again and will be conversing with them.  I think that rules out a couple of those options.  You have given me plenty to make the details convincing.  I will continue plodding along but will have more questions.

3
General discussion / Re: author looking for hacking info
« on: December 09, 2014, 11:35:33 pm »
You all have been very helpful.  A couple quick questions.


Let's say someone in the group set up an IRC server on the .tor network.  Someone breaks into a private chat they created there and leaves a comment that makes it clear that not only did the person break in but they were specifically looking for this group of people.  Is that enough for a tech savvy person to start to get pretty nervous?  Would he begin to assume government level?  Or maybe that someone in the group is under physical surveillance or sophisticated key logger? 

The idea is that I want this to seem extremely difficult but not impossible.  That way, either it is scary bad guys or they begin to distrust each other, assuming one of their own is behind it.






4
General discussion / Re: author looking for hacking info
« on: December 04, 2014, 09:29:59 pm »
This is great.  Can you easily point me to some instructions on how one would set up an IRC network via tor?  I can google but maybe there is already a resource you are familiar with?  I don't want to DO it, just describe it with some accuracy.


Either one of the group leaked the address or there is a badass....a state actor or even worse.  That is the mystery that starts off the story and your comments have been very helpful.

5
General discussion / Re: author looking for hacking info
« on: December 04, 2014, 08:45:16 pm »
Dropping bitcoin mining.  Would there be some advantage to only spreading a  spam botnet via direct access to the machines he services?  I like the idea of his doing something illicit (but not particularly harmful to the victim) on the machines he directly services.   He's not a bad guy, just cynical and wanting to generate some cash off of naive grannies and other computer newb clients.

6
General discussion / Re: author looking for hacking info
« on: December 04, 2014, 08:38:20 pm »
Looks like diminishing returns for Bitcoin botnets.  May drop the idea or I could set this a few years ago.


http://www.theregister.co.uk/2014/06/24/bad_news_malware_infections_are_mining_bitcoin_good_news_theyre_not_making_any_money/


I like the idea of IRC just because it is a service that most readers would not even be familiar with and has a sort of "techxotic" feel to it.  So if it is possible to keep an IRC room fairly secure from outside interference I will go with that.  My initial research led me to believe that someone security conscious might not use IRC. 

They are not (initially at least) worried about government hacks but it needs to be surprising enough that someone breaks in that they begin to suspect one another.


7
General discussion / Re: author looking for hacking info
« on: December 04, 2014, 08:16:35 pm »
Thank you for that reply. 

I was originally going to go with IRC but read that it was not too secure.  Google chat?  Just need some service that would surprise a tech savvy person if their group chat found itself with an uninvited guest. I can also make up these services, but for now wanted to go with the real world stuff.

8
General discussion / author looking for hacking info
« on: December 04, 2014, 08:01:53 pm »
Greetings!  I am writing a novel, and want the technical aspects to be realistic.  I am hoping that members here might not mind answering a few questions from time to time.  I am not looking for step by step instructions, just enough info and description to make certain passages authentic.  Here are a few questions off the bat to give an idea.  If this is in the wrong forum or if this solicitation is unwelcome, then moderators please feel free to move or delete.




1.  If you had a very tech savvy group looking to engage in fairly regular, or even persistent group chat, what service would they choose?  I want a service that has enough security that when someone unexpected shows up in their group chat they are rather alarmed.


2.  One idea I had was skype, invite only, with password on the chat.  How hard would that be to break into? Mainly using for messaging, not voice or video.




3.  One character does computer repair...his own small business, just out of his home.  I want him to be placing some malware on the machines he services so that they mine bitcoins for him.  Now, over a few years he probably does not access more than...I dunno...two or three hundred systems, though he could write the malware to spread somehow.  Point being, he is not going to get rich doing this, but it's free income.  Assuming the two or three hundred consumer grade machines, what's a realistic value for the bitcoin he might mine?  I know there are several variables, but could he make a couple hundred dollars a month or would that be unreasonable?  What if he accessed a few small businesses so that we could up the number of machines? No, I will not ask for an actual program to do this, though the anatomy/ pseudocode of such a script  might be helpful. Or is this not even realistic to begin with?

Very long first post...don't mean to be rude. Thanks for any interest!

Pages: [1]