The author recounts their experience in an Illinois court fighting for access to public records pertaining to the state's Freedom of Information Act (FOIA) request portal. They discovered and reported a SQL injection vulnerability in the portal, which the state acknowledged but failed to fix promptly. After repeated denials of their FOIA requests related to the vulnerability's remediation, they sued. The judge ultimately ruled in their favor, compelling the state to fulfill the request and highlighting the absurdity of the situation: having to sue to get information about how the government plans to fix a security flaw in a system designed for accessing information. The author concludes by advocating for stronger Illinois FOIA laws to prevent similar situations in the future.
The Substack post details how DeepSeek, a video search engine with content filtering, can be circumvented by encoding potentially censored keywords as hexadecimal strings. Because DeepSeek decodes hex before applying its filters, a search for "0x736578" (hex for "sex") will return results that a direct search for "sex" might block. The post argues this reveals a flaw in DeepSeek's censorship implementation, demonstrating that filtering based purely on keyword matching is easily bypassed with simple encoding techniques. This highlights the limitations of automated content moderation and the potential for unintended consequences when relying on simplistic filtering methods.
Hacker News users discuss potential censorship evasion techniques, prompted by an article detailing how DeepSeek, a coder-focused search engine, appears to suppress results related to specific topics. Several commenters explore the idea of encoding sensitive queries in hexadecimal format as a workaround. However, skepticism arises regarding the long-term effectiveness of such a tactic, predicting that DeepSeek would likely adapt and detect such encoding methods. The discussion also touches upon the broader implications of censorship in code search engines, with some arguing that DeepSeek's approach might hinder access to valuable information while others emphasize the platform's right to curate its content. The efficacy and ethics of censorship are debated, with no clear consensus emerging. A few comments delve into alternative evasion strategies and the general limitations of censorship in a determined community.
Former tech CEO and founder of online invitation company Evite, Al Lieb, is suing to have records of his 2016 domestic violence arrest expunged from the internet. Despite charges being dropped and the case dismissed, Lieb argues that the persistent online presence of his arrest record unfairly damages his reputation and career prospects. He's targeting websites like Mugshots.com that publish arrest information, claiming they profit from this information and refuse to remove it even after legal proceedings conclude. Lieb believes individuals have a right to privacy and to move on from past mistakes when charges are dropped.
Hacker News commenters largely discuss the legal and ethical implications of attempting to remove public arrest records from the internet. Several express skepticism about the plaintiff's chances of success, citing the importance of public access to such information and the established difficulty of removing content once it's online (the Streisand effect is mentioned). Some debate the merits of his arguments regarding potential harm to his reputation and career, while others suggest alternative strategies like focusing on SEO to bury the negative information. A few comments highlight the tension between individual privacy rights and the public's right to know, with some arguing that the nature of the alleged crime should influence the decision of whether to unseal or remove the record. There's also discussion about the potential for abuse if such removals become commonplace, with concerns about powerful individuals manipulating public perception. A common thread is the acknowledgment that the internet has fundamentally changed the landscape of information accessibility and permanence.
Summary of Comments ( 370 )
https://news.ycombinator.com/item?id=43175628
HN commenters generally praise the author's persistence and ingenuity in using SQL injection to expose flaws in the Illinois FOIA request system. Some express concern about the legality and ethics of his actions, even if unintentional. Several commenters with legal backgrounds offer perspectives on the potential ramifications, pointing out the complexities of the Computer Fraud and Abuse Act (CFAA) and the potential for prosecution despite claimed good intentions. A few question the author's technical competence, suggesting alternative methods he could have used to achieve the same results without resorting to SQL injection. Others discuss the larger implications for government transparency and the need for robust security practices in public-facing systems. The most compelling comments revolve around the balance between responsible disclosure and the legal risks associated with security research, highlighting the gray area the author occupies.
The Hacker News post "I Went to SQL Injection Court" (regarding the blog post about FOIA issues in Illinois) has several comments discussing various aspects of the situation.
Many commenters focus on the absurdity of the legal arguments and the judge's apparent lack of technical understanding. One commenter highlights the judge's confusion between SQL injection and simply using SQL, pointing out that using SQL isn't inherently malicious. This commenter expresses frustration with the legal system's inability to grasp basic technical concepts, leading to flawed judgments. Another commenter sarcastically suggests that using a web browser constitutes "browser injection" because it involves sending commands to a server, mirroring the faulty logic applied to SQL injection.
Several comments discuss the implications of this case for security research and vulnerability disclosure. Commenters express concern that this ruling could discourage security researchers from reporting vulnerabilities, fearing legal repercussions for simply demonstrating how an exploit works. They argue that this chilling effect could have detrimental consequences for online security. One commenter draws a parallel to medical research, arguing that prosecuting someone for demonstrating a vulnerability is akin to prosecuting a medical researcher for demonstrating how a virus spreads.
Another commenter expresses concern over the reliance on "intent" in determining the legality of security testing. They argue that focusing on intent is subjective and difficult to prove, making it a poor basis for legal decisions in technical matters. This commenter suggests that a more objective standard based on the actual actions taken would be preferable.
Some comments delve into the specifics of Illinois law and the legal arguments presented. One commenter notes the apparent contradiction between the court's ruling and the Illinois Compiled Statutes, suggesting a misinterpretation of the law. Another points out the apparent lack of evidence presented by the prosecution, focusing solely on the method used rather than any demonstrable harm caused.
A few commenters offer practical advice and alternative perspectives. One commenter suggests that using a proxy server could potentially circumvent the legal issues raised in the case. Another commenter offers a more cynical view, suggesting that the prosecution may be motivated more by politics and personal vendettas than a genuine concern for cybersecurity.
Finally, some commenters express broader concerns about the increasing criminalization of security research and the potential for chilling effects on legitimate activities. They advocate for clearer legal frameworks and better education within the legal system about technical matters to prevent similar situations in the future.