Home Technique guilty

guilty



Overview

The"winny"softwarecameoutinDecember2002.ItisapopularnetworkfileexchangesoftwareinJapan.Userscanuseittoretrievefilesofinterestsuchasmovies,musicandgamesontheInternet.Iftheyfindthefilestheyneedinthesharedfoldersofother"winny"users'computers,theycandownloadthematwill.

winnyisamoreadvancedp2psoftware.winnyisbasedonthefreenet(freenetwork)model.Theipaddressisencrypted,sotheconfidentialityisstrong.Supportsoftwaresearch,itiseasytofindwhatyouwantinthevastsharedlibrary.Atthesametime,itsupportsmulti-threadeddownloading(fastdownloadingspeed),resumabledownloadingatbreakpoints,andcaneffectivelybreakthroughthefirewall.What'smore,ithasrealizedtheformofp2pforum,whichhasrealizedtherevolutionfromserverforumtodistributedforum.Don'tthinkitisunknown,itisthemostusedp-2-psoftwareinJapan,with2millionusers,anditisincreasing.

Origin

Atthebeginningof2009,apost"MaritimeSelf-DefenseForceSecretsLeaked"appearedontheInternetBBS.These"confidentialdocuments"containdetailssuchascallsignals,passwordusageforms,emergencycalls,andeventrainingandcombatrecordsusedbyadestroyernamedChaoxue.What'smorefrighteningisthatamongthepublished"extremesecrets"(theJapaneseDefenseAgencydividessecretdocumentsintothreecategoriesaccordingtotheirimportance:"secret","extremesecrets",and"extremesecrets".)ThereisalsoJapan.TheMaritimeSelf-DefenseForce'sunusedpasswordandthesortingserialnumberofthepasswordfile,etc.AweekaftertheinformationspreadontheInternet,theJapaneseDefenseAgencyconfirmedthatthesesecretdocumentswere"true."Thisintelligenceleakwascalledbymilitaryexpertsthebiggestleakdisasterin"Japan'sdefensehistory."

Coincidentally,onemonthafterthe"Asakusa"leak,thebusinessinformationoftheJapanGroundSelf-DefenseForceandtheAirSelf-DefenseForce,andthesearchinformationofthepoliceinOkayamaandAimeeprefectureswereleakedagain.Inaddition,manycompanieshaveleakedtradesecrets.

AseriesofleaksshockedJapan.Atthetime,JapanesePrimeMinisterKoizumiorderedtheDefenseAgency:Itisnecessarytothoroughlyinvestigatethetruthofthe"Asashuki"leak.Afterinvestigation,thechiefculpritwholeakedthesecretwasthe41-year-oldChiefHaiCao,amemberoftheSelf-DefenseForceofthe"ChaoXue"destroyer.Asatelecommunicationsofficer,heisresponsibleforhandlingallexternalliaisonandcommunicationaffairsofChaoxue.Thetelecommunicationsroomisanimportantplaceontheship,andthelevelofconfidentialityisevenhigherthanthatofthe"combatcommandpost."Telecommunicationsofficersarespeciallyauthorizedconfidentialpersonnel.AlthoughtheJapaneseDefenseAgencystrictlyforbidstheteammemberstomoveandstorework-relateddata,itisthisimportantsecretpersonwhomadethedocumentscommonlyusedintheworkintoaCD,tookthesecretdatahomewithoutauthorization,andcopiedittoapersonalcomputerconnectedtotheInternet.

Astheinvestigationprogresses,theinvestigatorsfoundthatHeisōChangusuallylikestouseJapan'smostpopulardownloadcommunicationsoftware"winny"todownloadsongsandmovies.Theinternalstaffofotherunitsinvolvedinaseriesofinformationleakageincidentsalsousedpersonalcomputersequippedwith"winny"softwaretohandleofficialduties.

Afterthe"Assuki"leak,theJapaneseDefenseAgencyimmediatelysetupa"radicalcountermeasurereviewmeeting"toseekcountermeasurestopreventsimilarincidentsfromhappeningagain.Thecountermeasuresgivenbythe"EffectiveCountermeasuresReviewMeeting"include:for"confidential"and"extremelysecret"levelsecretinformation,ifthereisaleak,theleakershallbesentencedtoafixed-termimprisonmentofnotmorethan5yearsaccordingtotheSelf-DefenseForceAct,andevenifitisnegligent,hemustberemovedfromoffice.;AlldatastoredinCD-ROMandotherinformationcarriersshallbeindividuallyencrypted,otherwisetheinformationwillbe“discussed”byleakinginformation.Atthesametime,theJapanesegovernmentrequiresthatbasicindustriessuchasfinanceandaviation,whicharecloselyrelatedtonationallifeandsocialandeconomicactivities,takethoroughmeasurestopreventleaks.Atthesametime,majorJapanesecompanieshavedevelopedfilteringsoftwarefor"winny"oneafteranother.

FrequentlyAskedQuestions

However,the"winny"softwareisalsoahotbedofsomecomputerviruses.Oncethefilesdownloadedusingthissoftwarehidevirusessuchas"Antinny",theuseronlyneedstodouble-clickthedownloadedfileicon,andthecomputerwillbeinfectedwiththevirus.Thisviruscanfreelycompressthefilesinthecomputerandplacetheminthesharedfolder.OncethecomputerisconnectedTheInternetwillleadtoinformationleakage.Inaddition,sincethissoftwareisapeer-to-peernetworkfileexchangesoftwarebasedonthefreenetworkmodel,itsupportsdirectdataexchangebetweencomputerswithoutaserver,andcannotrecordtheuser'sIPaddress,whichincreasesthedifficultyofconfidentialitysupervisiontoacertainextent.Becausethecomputeritselfdoesnotappearabnormal,usersoftendonotrealizethatthecomputerisinfectedwithavirusuntiltheyarenotifiedbyothersthattheirpersonalinformationhasbeenleaked.Tomakemattersworse,thelostfileswillberecordedinmanycomputersanditisalmostimpossibletorecoverthem.

AccordingtoXinhuaNewsAgency,inmid-December2006,YuKaneko,whoworkedattheGraduateSchooloftheUniversityofTokyoanddevelopedanddistributed"winny"software,wasfined1.5millionyen(approximately)bytheKyotoDistrictCourtofJapan.(US$12,800)becauseitviolatedthecopyrightlaw.HewasfoundguiltyinthefirstinstanceonDecember13ofthesameyear.Anappealwasfiledthatday.OnOctober8,2009,theOsakaHighCourtoverturnedthefirstinstanceverdictandruledthatKanekowasnotguilty.ThefocusoftheentiretrialwaswhetherWinnywasdevelopedforthepurposeofpiracyandcopyrightinfringement.Thismarksthevictoryof"technologicalneutrality".

JustwhenallpartiesinJapanaretakingemergencymeasurestostoptheleaking"skylight"of"winny",therearestillmanysoftwaredownloadwebsitesinmycountrythatprovidethelocalizationof"winny"software.Version,somelargewebsiteshaveevendownloadedtensofthousandsoftimes.TheleakinJapanhassoundedawake-upcallforus.Ontheonehand,wemustdoagoodjobofprotectingthe"winny"software.Ontheotherhand,itisnecessarytostrictlyabidebytheregulationsthatsecret-relatedcomputersmustnotbeconnectedtotheInternetorotherpublicnetworks,andthatsecret-relatedinformationshouldnotbeprocessedoncomputersconnectedtotheInternet,soastopreventleaksfromhappeningatthesource.

This article is from the network, does not represent the position of this station. Please indicate the origin of reprint
TOP