{"id":9058,"date":"2018-06-16T19:52:40","date_gmt":"2018-06-16T23:52:40","guid":{"rendered":"https:\/\/spinor.info\/weblog\/?p=9058"},"modified":"2018-06-16T19:52:40","modified_gmt":"2018-06-16T23:52:40","slug":"nineteenth-century-cybersecurity","status":"publish","type":"post","link":"https:\/\/spinor.info\/weblog\/?p=9058","title":{"rendered":"Nineteenth century cybersecurity"},"content":{"rendered":"<p>When I was a teenager, the classic novel, The Count of Monte Cristo by Alexandre Dumas, was one of my favorites.<\/p>\n<p>And one of my favorite chapters in that book was a chapter with an uncanny (not to mention unusually long) title: &#8220;How a Gardener May Get Rid of the Dormice that Eat His Peaches&#8221;. In it, Dumas <a href=\"https:\/\/spectrum.ieee.org\/tech-talk\/telecom\/security\/what-the-count-of-monte-cristo-can-teach-us-about-cybersecurity\">describes a classic hack<\/a>: exploiting the human in the system. By bribing an operator of France&#8217;s early optical telegraph network, the book&#8217;s protagonist is able to plant a false message, which ultimately contributes to the downfall of one of his mortal enemies. In short: a targeted cyberattack on a telecommunications network.<\/p>\n<p><a href=\"https:\/\/www.1843magazine.com\/technology\/rewind\/the-crooked-timber-of-humanity\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9059\" src=\"https:\/\/spinor.info\/weblog\/wp-content\/uploads\/2018\/06\/telehack.jpg\" alt=\"\" width=\"389\" height=\"569\" srcset=\"https:\/\/spinor.info\/weblog\/wp-content\/uploads\/2018\/06\/telehack.jpg 389w, https:\/\/spinor.info\/weblog\/wp-content\/uploads\/2018\/06\/telehack-205x300.jpg 205w\" sizes=\"(max-width: 389px) 100vw, 389px\" \/><\/a><\/p>\n<p>What I did not know, however, is that this chapter may have been inspired by <a href=\"https:\/\/www.1843magazine.com\/technology\/rewind\/the-crooked-timber-of-humanity\">real life events<\/a>. About ten years before Dumas published his novel, the brothers Fran\u00e7ois and Louis* Blanc managed to <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Fran%C3%A7ois_Blanc#Les_grandes_%C3%A9tapes_de_sa_carri%C3%A8re\">hack the telegraph network<\/a> in a manner even more sophisticated than the hack described in Dumas&#8217;s book. Yes, the real-life hack relied on bribing operators, too, but it also involved a case of steganography: inserting a coded message that would piggyback on the original telegraph transmission. Not only did the scheme succeed, like any good hack it remained in place and undetected for two years. And when it was finally detected, the Blanc brothers were charged but never convicted; there were, after all, no laws on the books back in the 1830s against misuse of data networks.<\/p>\n<hr \/>\n<div style=\"font-size: 9pt; line-height: 1.5em;\">*Well, that&#8217;s what Wikipedia <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Fran%C3%A7ois_Blanc\">tells me<\/a>. It appears that the twins are misidentified as Francois and Joseph in several English-language publications. Francois was later known as The Magician of Monte Carlo, a casino that he owned and where he first introduced the single-0 style roulette wheel.<br \/>&nbsp;\n<\/div>\n<fb:like href='https:\/\/spinor.info\/weblog\/?p=9058' send='true' layout='standard' show_faces='true' width='450' height='65' action='like' colorscheme='light' font='lucida grande'><\/fb:like>","protected":false},"excerpt":{"rendered":"<p>When I was a teenager, the classic novel, The Count of Monte Cristo by Alexandre Dumas, was one of my favorites. And one of my favorite chapters in that book was a chapter with an uncanny (not to mention unusually long) title: &#8220;How a Gardener May Get Rid of the Dormice that Eat His Peaches&#8221;. <a href='https:\/\/spinor.info\/weblog\/?p=9058' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,45,51,25],"tags":[],"class_list":["post-9058","post","type-post","status-publish","format-standard","hentry","category-books","category-communication","category-computer-security","category-history","category-9-id","category-45-id","category-51-id","category-25-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"_links":{"self":[{"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/posts\/9058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9058"}],"version-history":[{"count":16,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/posts\/9058\/revisions"}],"predecessor-version":[{"id":9075,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=\/wp\/v2\/posts\/9058\/revisions\/9075"}],"wp:attachment":[{"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/spinor.info\/weblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}