Sei sulla pagina 1di 4

The culture of the virus The culture of the virus

F
The anti-viral industries are engaged in a battle against the natural. Self reproduction is ree software exposes code and illuminates At the same time, viral technologies
context, shedding a wide light on technologies could readily be explored and
embedded deep within the technology of computation and by default its history and culture. and extruded economies, rewriting histories and exploited within an open context and
creating a meaningful culture. In the field of the under the heading of a new notion of
Martin Howse sieves out the viral seed under both open and closed coding models viral episodes such as the Bliss affair, in which free promiscuous computing. One
software rubbed shoulders with the anti-viral industry, example within contemporary
exposing hype and deception, prove particularly illuminating. aesthetics is the project ‘Life Sharing’
Free software also provides a handy lens with which to from 0100101110101101.ORG which
view both code and its culture as inherently viral. And of opens up all the artist’s machines for
course the GPL as virus is a common theme kicked off by free access. Parallels abound with the
Microsoft and subsequently embraced by both the Free totally open and password free ITS or
Software movement and its opponents, yet there can Incompatible Time Sharing system
little doubt of its concrete viral nature in which pioneer hackers such as Richard
reproducing a license text file across thousands of Stallman used back in the day at MIT.
software directories and which implicates The link to free software is both
subsequent code releases. historic and essential.
Though implying damaged nature, with roots in Computer viruses can readily be
Latin referring to poison and venom, the viral can well viewed in this openly reproductive
be viewed as benign in this light - and the evolution of the light, with contemporary networked
computer virus does show that healthy experiment and fears reflecting nothing more than an
the same prankster spirit that is embedded within the age-old recurring panic over
hacker ethic so dear to the free software community promiscuity. It’s now a question of
lie at the origins of the computer virus. electronics, of the free exchange and
Such histories need to be teased out and contrasted flow of information, and it’s
against the tedious contemporary machinations of script interesting to note that headline
kiddies and the like unknowingly implicated within vast searches under google for the term
machinations set in motion by morphing executables and promiscuous reveal no salacious
resulting in escalating security measures eroding the details, rather affording somewhat dry
freedoms of the user. After all, DRM and trusted coverage of a mode for wireless

The viral, as obfuscated and self


reproducing executable segment, exists
in strange relation to open code
computing initiatives can guarantee and manage both devices under which the card will
content and executable. receive and share in all network traffic.
And it’s worth noting that free software participates The intended recipient, the trusted
little, other than on the side of prevention with apps such and known partner, is irrelevant.
as ClamAV, in the spawning mass of viral nature. That’s Promiscuous computing, in
very much a proprietary affair, which is not to say that common with efforts such as the GNU/
viruses cannot be written to run on GNU/Linux. Examples Hurd which attempt to wrestle control
exist, yet there can be little doubt that the viral, as from the hands of a privileged and
obfuscated and self reproducing executable segment, monolithic kernel, is all about freedom,
exists in strange relation to open code. addressing the segregation of
functionalities at the stacked levels of
LIFE SHARING network, user and code or process.
From humble and inauspicious beginnings rooted within Talk of segmentation in the kernel
academic recreation and imaginative fiction, the culture of source code and within CPU design is

AGAINST NATURE
the computer virus has exploded to embrace hardcore talk of segregation. And Robert Slade
scientific research, forensics, serious networked security traces the roots of the term worm to
issues and an expanding and highly questionable the wormhole like debugging traces of
underground movement with increasingly rogue programs which had escaped
opaque motivations. The symbiotic from within their boundaries or
relationship between the virus detection, and partitions. Sacrificing banal

The culture of the virus


protection industries and this burgeoning and functionality in favour of open
highly explosive subculture proves a highly experiment are the watchwords of a
rewarding area for further study, with both move towards promiscuous computing
parties locked in cold war style escalations little which recognises that code and kernel
assisted by industry hyperbole. policy are political matters.

28 LinuxUser & Developer LinuxUser & Developer 29


The culture of the virus The culture of the virus

SOCIAL SOFTWARE Biennale.py source code

WORD MADE FLESH


At a reductive level it would appear
that the multi-million pound anti-virus
industry exists solely thanks to the
efforts of a rather unhealthy gaggle of In throwing the spotlight on a tight knit of fiction, Montreal-based MacMag
rebellious teenagers. If we can economics, culture, community and code, Bliss could easily magazine Richard Brandow was
compare virus writing to say tagging be regarded within the frame of contemporary aesthetics, eager to claim responsibility. He
which often attempt such feats but rarely succeed. One claimed alternately that the value
it appears as a pretty lucrative paint
decent example, again prompting panic amongst the of the virus lay in its message
removal business. Yet though easily uninitiated and amply demonstrating how taboo the topic promoting world peace, and that, in the
and perhaps correctly viewed as of the viral, except from the supposedly scientific viewpoint words of Slade “he wanted to make a
digital vandalism, in common with of the heatedly anti-viral, is the biennale.py work fake virus statement about piracy and copying of
graffiti, it is also a culture and has distributed in textual form on T-shirts by hardcore artist computer programs.” Stallman’s
rarely been viewed from such a group 0100101110101101.ORG. With source code making attitude to such issues could easily
textual reference to sexual promiscuity by way of a party be inserted here, alongside his
perspective. Parallelling the
variable and fornicate function amongst others, biennale.py assertion, repeated within the context
contemporary histrionic rise of neatly wraps up viral issues of responsibility and distribution. of an early anthology of essays on
scamming, phishing and spamming It’s enough to mention the words artist and virus in the computer viruses, that security is a sickness rather
the viral also enters economy at same breath to cause the very heat death of unknowing than a cure,
another serious level other than that media. That biennale.py was largely a hoax, and parallels MacMag has since been reclaimed as authored in
of Symantec and co. Writers are with the T-shirt distribution of DeCSS source, make of it a the pranksterish spirit of Neoism, itself a viral and
neat conceit. nihilist movement of shifting intent and technique
beginning to ply their trade for hard
Yet, biennale.py was by no means the first of such viral- rising from the ashes of Dada and situationism.
cash. And at the same time cunning occupied artistic pranks. In the eyes of net art critics such as William Burrough’s language as virus, alongside the
technology is being replaced by Tilman Baumgartel and Florian Cramer, the MacMag virus, literature of the quine extended into the realm of mass
embedded and heftily remote social itself one of the first to attack a personal computer, pipped media, stand proud within such a context.
engineering. The virus can now be it to the post by a good 13 years. MacMag was distributed And Cramer writes of the virus, considered as a
viewed as social software running on as a HyperCard file, which when opened installed an contemporary literature of the net, as a virulent example of
the insecure OS of misinformation. extension which would cause the machine to display a the word made flesh within the executable. A word made
cheesy new age style message on startup. MacMag was flesh of explosive power given the sheer size of a global
Yet rather than attacking virus For the viral erupts on a vast terrain individual hardware marked under a
reproductive, spreading by way of exchanged system disks infrastructure dependent on the network. It’s high time to
authors from the sheer perspective of of property, ownership and thus of network considered by many as one and the author, or rather commissioner of code, publisher of rethink not only literature but all viral matters in this light.
supposed and inflicted damages, it’s boundaries. It questions what it vast machine with scripted web pages
easy to prove from both technological means to own hardware, who and remote applications paving the
and cultural perspectives that the controls software and what happens first steps for a road into purely viral responsibilities. It may well be up to within a subsequent security seminar. Yet, it’s also worth noting that the
virus is as natural to computation as it as soon as we plug into a vast territory? user to keep her own machine A virus was thus defined as “a worm term has few negative
is to our own bodies and cells. The network of unseen possibilities, of The network, executable code and secured yet parallels with real world program that can infect other connotations and was first used to
viral, by way fo Joseph Von Neumann corporate control, of spam bots, and the viral are all concerned with activity and physical law are largely programs by modifying them to benign effect; software would occupy
and cellular automata, is embedded of the viral; where the only contact visibility. Viruses are by their nature inappropriate and should be left well include a possibly evolved copy of otherwise idle machines for useful
within the history of computation, with the human is through socially hidden and free software in relation to at home in some dusty corner of aged itself.” And it’s worth noting with purpose. Such research took place in
and within core technologies. Nearly engineered financial loss. Who pushes property rights is inextricably united and inappropriate metaphor. There reference to freedom and viral nature the early 80s at the important Xerox
all computation involves replication, the buttons? Code or user. Who owns with this domain in a battle of wildly are no doors being left open and that Cohen himself writes that “... Palo Alto facility on a closed network.
with software copied across media, and is responsible for this spawning changing frontiers, of impossible Richard Stallman presents a good prevention of computer viruses may Within the context of a global
disk, memory and processor cache. code, and where is the boundary of ethics and questionable range of arguments in such a debate be infeasible if widespread sharing is network, the power of the worm, to
And the compiler is totally implicated around the core concern of free desired...” Eugene Spafford also notes inundate, multiply, spread and thus
within the viral scene. In both human computing. The virus presents a rich rewarding parallels between the viral clog networks, is immense.
and machine instances a virus is of thematic embracing the historical, and the realm of artificial life.
course seriously harmful but it does cultural, linguistic, and aesthetic, The difference between a worm VIRAL NATURE
pay to consider the wider context free exposing boundaries and privacies, and a virus, which is interesting to The evolution In contrast, the true virus exists thanks
from hot blooded assumption. The networks, as well as participating in dissect with regard to social of the to an unsuspecting and ill informed
virus shares much with other the exposure offered by crash, and engineering and free software, boils computer user bewildered within a vast realm of
contemporary demons with the war economies of productivity and cash. down to one of distribution, how the virus does hoax and deterministic GUI. Within
on terrorism presenting another battle software reproduces and thus spreads. show that such a world of fiction and simulation
against an ill specified, largely invisible WORM HOLES Originally pinned down on a sneaker- healthy all is to be untrusted. At the same
and in some cases fictional target Definitions of, and indeed the sheer led divide, with virus in the domain of experiment time, the flattening enacted by the
laden with emotion and politics. difficulty of adequately and the floppy and worm on newly
and the possibly unknown executable,
same
scientifically defining, the minted net, a worm is now classified unknown as to its code and effects,
prankster
AT THE FRONTIER phenomenon which is well intuited in as a subset of the viral. Yet the main spirit that is tied to a specific, and again possibly
Viral authors may well be operating a matter of seconds, are well difference comes down to human embedded unknown, architecture defines a
through sheer malice or under corrupt rehearsed elsewhere with the key intervention. A virus attaches to a within the region haunted by the viral; viruses
and misguided financial influence but figure of Fred Cohen presiding over program or file, yet cannot spread hacker ethic without notation whose effects can
truly the investigation of this magical ceremonies. In his seminal paper until the infected file is executed in so dear to only be known at execution time.
reproduction, of the cellular in a dating back over twenty years to some manner. By contrast a worm can the free Thus perhaps the main reason that
parallel world, is an intriguing Perpetual Self Dis/ 1984 he defines the term, attributed spread between machines with no software nearly all viruses in the wild target the
proposition. We could scarcely critique Infecting Machine. to Len Adleman and describes how human agency other than that of its community Windows family lies not solely in their
a contemporary Von Neumann Custom made coders toiled over a “heavily loaded creator. Worms exist as standalone
lie at the popularity nor in the lack of
origins of the
investigating self-reproducing computer infected VAX 11/750 system running Unix” for creatures with the historic Morris knowledge of users, but rather
computer
automata within the vast field of with the virus eight hours to produce an worm of 1988 as prime example in virus through the proprietary nature of OS
possibilities opened up by the network. Biennale.py experimental virus, for use as example relation to a Unix operating system. and executables all Windows apps are

30 LinuxUser & Developer LinuxUser & Developer 31


The culture of the virus

obfuscated code? On a side note it’s executable, in truly rendering


worth referencing a recent executable, is the most vulnerable and
Underhanded C contest, inspired by most trusted component. After all
the Obfuscated C affairs, which sets a even if we live in a hallowed land of
challenge to write code which totally open source code, the compiler
performs some covert function, yet is the only thing we only need to
which stands up to close visual compile once, and which can infect
scrutiny. all our precious source, or rather
And at the same time, most systems binary brethren. The mystery of the
aren’t truly open to their very roots. executable is well exposed here. All
The realm of the executable lies code is untrustworthy unless self
within the physical arena of hardware created. At the same time, a compiler
after all. It’s hardly surprising given can well be considered as a virus
the embedding of copying within under Cohen’s definition through
hardware, that the most common being self reproducing. Though by
computing architecture today is that the same definition we could also
designed by Von Neumann, a figure include the editor, in conjunction
obsessed with self-replicating systems. with, say, a shell code interpreter.
Alongside Stanislaw Ulam, co-inventor Yet Cohen’s further conclusion,
of the hydrogen bomb, he is credited arguing for stronger punishment of
as kicking off cellular automata, virus authors in comparison of such
building on his work with self acts with joyriding and physical
reproducing automata comprised of vandalism are open to question within
three main components; a universal the context of ownership in a shifting
machine, universal constructor, and digital economy. Just as those who
information on tape. In 1967 Robert refer to piracy and stealing content
Schrandt talks of fights between rely on a narrow range of metaphors
automata. The measure of control is identifying these with the purely
slipping. From here we can readily physical, so the field of the viral is not
jump into both Conway’s Game of at all free from political bias. As code
Life, precursor of other viral becomes more autonomous who can
experiments and intellectual exercises be blamed for its wayward antics?
such as Core Wars, and into the viral
field of artificial life, with spawning VIRAL CULTURE
cellular software embedded in the It’s readily acknowledged that the
sandboxes of Tom Ray’s Tierra. The virus was christened within fiction,
ghost is very much in the machine. within stories such as The Shockwave
Rider in 1975, which spoke of a
THE JOYRIDE tapeworm bringing down a
At the junction of source code and totalitarian network, and When Harley
executable lies the compiler; true viral was One in 1972, and indeed
technology as identified within UNIX occupies a realm of fiction, the FUD of
viral, potentially. Shareware ready to Life Sharing - guru Ken Thompson’s seminal 1984 the anti-viral industries, and
wreak havoc on a specific date. It’s an screenshots paper, entitled Reflections on Trusting simulation. It’s all about deceit on all
environment under which freshly Trust. In this Turing Award acceptance sides. The virus was born within the
downloaded apps need to be x-rayed, speech, he concisely relates how he closed world of simulation, as
scanned, tested and emulated by modified the C compiler to insert a academic or hacker exercise; a world
competing anti-viral apps. The viral backdoor and further to throw his of quines, or self printing programs,

Contemporary networked fears reflecting nothing


more than an age-old recurring panic over promiscuity
loves the darkness of impenetrable modifications into any compiler of Darwin, expounding competition
assembly language, of unknown compiled using his modified version. between self-reproducing programs,
opcodes, and of proprietary code. He walks through his elegant quine- at Bell labs in 1971 and of similar
Software without source code is led demonstration in just eight pages, Core Wars sessions a decade later. We
inherently viral yet the technological and cultural can readily trace the rise of the
Yet open systems are not immune implications are vast and his computer virus within common
to the spawning virus. The viral is conclusion packs in dubious morals. computing culture, as coders sought
natural. Shadiness in code is always The compiler is a core viral to make real the promise of When
possible, and the move to obfuscation technology enabling reproduction by Harley was One, recreating a Creeper
is a move to the binary. After all what way of execution. program which copied itself across
is an executable if not heavily The compiler, in bridging to the host systems. The anti-viral arms race

32 LinuxUser & Developer


The culture of the virus

was also thus started with subsequent Robert Slade community in lumbering into what in response to this one lone
Creeper stalking Reaper code. traces the it simply saw as a new field ripe for sighting, McAfee, leading vendor of
And within the pages of a trilogy of roots of the exploitation. The story of Bliss also anti-virus software, released a
articles published in Scientific term worm proves interesting within the lengthy press release, boasting of
American in the early 70s discussing to the somewhat comical frame of an open their quick response to this major
the hacker pursuit Core Wars, under wormhole source, community developed virus. threat. Bliss, in their own words the
which sandboxed code segments like Indeed Bliss was much praised at first virus for Linux, could now be
battle for CPU supremacy, we can see
debugging the time in both showing that GNU/ detected and treated by McAfee’s
traces of
how readers responded to the Linux was now a popular platform, a own VirusScan for LINUX software.
rogue
challenge of the viral, transposing the programs false argument always given for the And again within such an extreme
game into the real machine world. which had prevalence of Microsoft-targeted realm of the absurd, it’s too
The virus was born from a software escaped viruses, and for demonstrating that tempting not to repeat gems such
fiction. from within it’s wrong to run untrusted binaries as the following:
And it’s easy to see how such early their as root. “McAfee researchers believe that
experiments within a closed domain, boundaries Bliss was first released, as an alpha one reason this virus has begun to
and more functional and necessary or partitions version, in 1996 and infection of a spread is because Linux users who
code, the early Rabbits and other random machine was reported on are playing computer games over
animals which made sure of a clean the linux-security list in early 97. the Internet, such as DOOM, must
slate for code on early mainframes by Major GNU player Alan Cox play the game in the Linux’s
copying a singular instruction across responded intelligently as follows, administrator mode, which is called
memory, were all to eager to expand “In theory you can write a virus for ‘root.’” - a response to arguments
as computing accrued the any OS if the owner is dumb enough that Unix systems are difficult to
encrustations of both physical and to install unchecked binaries as infect because the virus must run as
social networks. Distribution is central root.” The finger is very much privileged.
to the viral and it’s an easy route from pointed at the binary. Yet on the The community responded
floppy to network. The computer same day, the Bliss author, posted to adequately to what now appears a
virus changes in connotation and the comp.security.unix newsgroup, well played out farce which easily
meaning as the context shifts from exhibiting great concern that an demonstrates both the anti-virus
academic experiment or prank to the alpha version of his code had been protective racket, reliant on fear and
World Wide Web where it now released the year before, though ignorance, and the foundation of
accrues criminal intent, with Morris thankfully it had gone largely such an industry on poor practise
worm as transition point; the worm unnoticed. He attached an encoded and poor software, aside from any
unleashed by student Robert Morris Jr. binary 0.4.0 release, helpfully questions of property, of doors open
straight out of academia. The history compiled with full “debugging or doors closed. The exquisitely well
of this viral expansion is well repeated verbosity on,” after issuing profuse documented Bliss episode
elsewhere and does make for descriptions of what the code illuminates a misjudged symbiosis
interesting reading with repeated, actually does, and warning any between viral subculture and
fugal characters and themes; a family reader not to run this tough to antiviral software industry in relation
tree of virus methodologies for unscramble binary. A new version, to free software as open code.
example with comebacks such as which further commentators
Linux/ADM repeating the Morris speculated may be under a GPL
worm of ten years previous. license, was mooted and the

SISTER BLISS
Bliss, picked up way back in 97,
conceptual nature of the exercise
can well be gleaned from the
author’s assertion that little if
Key Links
Life Sharing
wasn’t the first virus targeting the anything is Linux-specific in the www.0100101110101101.org/home/life_
GNU/Linux platform, that dubious code, which can and has been sharing
position is reserved for Staog, but it ported to a range of other OSes. The Robert Slade
sun.soci.niu.edu/~rslade/rms.htm
was the most well commentated point heftily underlined here being Fred Cohen
and first to receive the attentions of that the viral is deeply intrinsic to www.all.net/books/virus/part5.html
Morris Worm:
industry, making visible the differing computation, before we even throw world.std.com/~franl/worm.html
cultural conditions and economies networks into the equation, and that Tierra
which condition the viral under viral efficacy or magnitude is purely www.his.atr.jp/~ray/tierra
Reflections on Trusting Trust
open as opposed to proprietary a matter of culture. Bliss makes such www.acm.org/classics/sep95
systems. The story is well related apparent. Far from malignant in Core Wars
online with full correspondence both description and traced www.koth.org
Unix Virus Bibliography
between Alan Cox and others on dissection, and even including a www.users.qwest.net/~eballen1/virefs.html
various kernel and security disinfection command line option, Bliss
math-www.uni-paderborn.de/~axel/bliss
newsgroups dissecting the virus and Bliss has an altogether different Neoism
arguing over terminology as to agenda than digital tagging. www.neoism.net
whether it is truly viral or rather a Biennale.py
www.0100101110101101.org/home/biennale_
Trojan. Some of this history is well HELP HELP? HAH! READ py/index.html
worth repeating as a demonstration THE SOURCE! MacMag
of how the anti-viral industry simply Enter McAfee. Again, on the very www.neoism.net/macmag_virus_-_history_
of_computer_viruses_1.html
mis-judged the free software same day, the 5th of February, and

34 LinuxUser & Developer

Potrebbero piacerti anche