This reminds me of an old folk tale of the trickster and the rich man.
A king passing through a town finds a man about to be punished for fraud. He intercedes and asks what the matter is. The trickster says in his defence, "I ask people for things, and they give then to me". The king is incredulous but poses a challenge: "You must ask and receive money from the richest man in town." The trickster agrees, but being short on assets, requests a loan. The king obliges, and the trickster arranges (eliding details) to induce the town's richest resident to provide him with a wealth of goods. He returns to the king two days later with evidence in tow. The king is impressed by this demonstration, at which the trickster notes that he'd actually met the conditions 48 hours earlier when the king, wealthier than the town's richest resident, had offered him a loan.
There's something to those old stories.
(I'm not positive of the source but believe it's included in Idries Shah's World Tales.)
A much lower-brow version of the same joke, from the movie Dumb and Dumber:
Lloyd: I'll bet you twenty dollars I can get you gambling before the day is out!
Harry: No!
Lloyd: I'll give you three to one odds.
Harry: No.
Lloyd: Five to one.
Harry: No.
Lloyd: Ten to one?
Harry: You're on!
Lloyd: I'm gonna get ya!
Harry: Nu uh!
Lloyd: I don't know how but I'm gonna get ya.
That seems to have worked because the king had an unmanageable level of overconfidence, whereas this worked because they already had mutual trust[0]. Advice from a friend passes easily through the "harm test" heuristic filter which takes place immediately after hearing any untrusted (doubted) person advising one to change course (and potentially other places if someone learns they need to apply it there too).
By mixing in advanced machinery, our innate heuristics like harm measurement need many more dimensions of analysis. Hackers, in tune with modern machines, recognize this as a blunder since we have seen trust misused with secrets in machines before; still how can a "[s]cientist and security researcher" and "farmer and shoe-repair-man with a handheld" alike learn to recognize wider effects of their machine-enabled actions?
1. Create issues for items I need fixed on my github repos.
2. Offer a $100 bounty to people who can trick me into getting some string into my projects. The easiest way to "trick" me of course is to hide it inside of a PR which fixes a real issue.
3. Find and remove the string before merging the PR. I've had one of my issues fixed for free. Rinse and repeat!
Bonus Round: Stage an announcement on twitter and have someone cleverly trick me into including the string on my website (which I was totally going to do anyway). Post clever trick to code geek social media and reap the sweet free viral marketing and hackers trying to earn a Benjamin.
@DefuseSec > I'll give $100 USD to anyone who can trick me into inserting the string "BackdoorPoCTwitter" into a release of any of my software projects.
@Sc00bzT > @DefuseSec You should put this challenge on your website.
Are some of you actually arguing over whether or not the website qualifies as a "software project?" Goodness, maybe stop taking the world so literally/seriously.
He had him post the challenge to his website. The text of the challenge contains the string "BackdoorPoCTwitter". By including the challenge in his website, he included the string in a software project (the code for his website). This won the challenge for @Sc00bzT, who was the one who told him to make the change to his website.
For those of you misreading this comment: Aelinsaar is saying that if a system/target is vulnerable to social engineering, then hacking (code) that system/target is not clever.
Huh? Some of the most clever (and destructive) hacks involve an element of social engineering. Given that security implementations are designed to compensate for human social behaviors and instincts and limitations, social engineering is just as much a part of hacking as cryptography.
[+] [-] dredmorbius|10 years ago|reply
A king passing through a town finds a man about to be punished for fraud. He intercedes and asks what the matter is. The trickster says in his defence, "I ask people for things, and they give then to me". The king is incredulous but poses a challenge: "You must ask and receive money from the richest man in town." The trickster agrees, but being short on assets, requests a loan. The king obliges, and the trickster arranges (eliding details) to induce the town's richest resident to provide him with a wealth of goods. He returns to the king two days later with evidence in tow. The king is impressed by this demonstration, at which the trickster notes that he'd actually met the conditions 48 hours earlier when the king, wealthier than the town's richest resident, had offered him a loan.
There's something to those old stories.
(I'm not positive of the source but believe it's included in Idries Shah's World Tales.)
[+] [-] kyllo|10 years ago|reply
[+] [-] mitchtbaum|10 years ago|reply
By mixing in advanced machinery, our innate heuristics like harm measurement need many more dimensions of analysis. Hackers, in tune with modern machines, recognize this as a blunder since we have seen trust misused with secrets in machines before; still how can a "[s]cientist and security researcher" and "farmer and shoe-repair-man with a handheld" alike learn to recognize wider effects of their machine-enabled actions?
0: https://twitter.com/search?q=from%3ASc00bzT%20to%3ADefuseSec...
[+] [-] dredmorbius|10 years ago|reply
[+] [-] tstrimple|10 years ago|reply
2. Offer a $100 bounty to people who can trick me into getting some string into my projects. The easiest way to "trick" me of course is to hide it inside of a PR which fixes a real issue.
3. Find and remove the string before merging the PR. I've had one of my issues fixed for free. Rinse and repeat!
Bonus Round: Stage an announcement on twitter and have someone cleverly trick me into including the string on my website (which I was totally going to do anyway). Post clever trick to code geek social media and reap the sweet free viral marketing and hackers trying to earn a Benjamin.
[+] [-] reledi|10 years ago|reply
[+] [-] joepie91_|10 years ago|reply
[+] [-] cranklin|10 years ago|reply
[+] [-] unknown|10 years ago|reply
[deleted]
[+] [-] DonkeyChan|10 years ago|reply
[+] [-] PhasmaFelis|10 years ago|reply
[+] [-] dclowd9901|10 years ago|reply
[+] [-] daxfohl|10 years ago|reply
[+] [-] aerovistae|10 years ago|reply
Another guy responded "You should put this challenge on your website."
The first guy said "Good idea" and proceeded to do so, thus including the string in one of his software projects: his website.
GG
[+] [-] nkristoffersen|10 years ago|reply
[+] [-] j79|10 years ago|reply
The offer still stands though, if you'd like to try: https://twitter.com/DefuseSec/status/730904219419443200
[+] [-] infogulch|10 years ago|reply
[+] [-] nkristoffersen|10 years ago|reply
[+] [-] joemi|10 years ago|reply
[+] [-] drunken-serval|10 years ago|reply
@Sc00bzT > @DefuseSec You should put this challenge on your website.
@DefuseSec > @Sc00bzT Good idea, added it to this page: https://defuse.ca/security-contact-vulnerability-disclosure....
@Sc00bzT > @DefuseSec Did I just win?
@DefuseSec > @Sc00bzT FUCK. What's your paypal/bitcoin?
[See https://github.com/defuse/defuse.ca/commit/4770ad5c9d4851d40... for commit.]
[+] [-] unknown|10 years ago|reply
[deleted]
[+] [-] jmcgough|10 years ago|reply
[+] [-] angry-hacker|10 years ago|reply
[+] [-] delibes|10 years ago|reply
[+] [-] goatherders|10 years ago|reply
[+] [-] pnathan|10 years ago|reply
[+] [-] unknown|10 years ago|reply
[deleted]
[+] [-] Jeremy1026|10 years ago|reply
[+] [-] satysin|10 years ago|reply
[+] [-] drudru11|10 years ago|reply
Maybe we shouldn't drink and "crypto"? :-)
[+] [-] anaolykarpov|10 years ago|reply
Maybe it's just a marketing stunt
[+] [-] CiPHPerCoder|10 years ago|reply
Disclosure: He and I have been friends for years.
[+] [-] emerongi|10 years ago|reply
[+] [-] rbobby|10 years ago|reply
[+] [-] unknown|10 years ago|reply
[deleted]
[+] [-] unknown|10 years ago|reply
[deleted]
[+] [-] shadykiller|10 years ago|reply
[+] [-] rschuetzler|10 years ago|reply
[+] [-] clapinton|10 years ago|reply
[+] [-] Aelinsaar|10 years ago|reply
[+] [-] cpeterso|10 years ago|reply
[+] [-] mmanfrin|10 years ago|reply
[+] [-] zerr|10 years ago|reply
[+] [-] danso|10 years ago|reply