52

James Bond, while working on a top-secret case for many weeks in deep enemy territory, finally collected and stored lots of critical files on his tight-security Linux system. Even though the system was on the internet, no unauthorized user could ever break-in and access the files marked For-Your-Eyes-Only. He then secretly contacted his group (M, Q, Moneypenny, Etc) to process the files. After 30 minutes, they all responded that the system said "No Access". So Bond tried to access the files, and true enough, the system said "No Access".

Meanwhile some other folks (probably double-agents or hackers from SPECTRE) had read all the files. Bond realised that he had made a big mistake, out of habit.


What mistake did Bond commit, that all his work was leaked so easily ?


FYI 1 : Here the tags for this question are important.

FYI 2 : He quickly recovered from this situation to prevent further leakage.

Prem
  • 5,144
  • 2
  • 17
  • 55
  • 6
    Is knowledge of James Bond needed to answer this question? – Rand al'Thor May 02 '15 at 19:03
  • Not arcane knowledge required. Only what anybody who has seen atleast one movie (or read atleast one novel) will know. – Prem May 02 '15 at 19:05
  • 4
    I've never picked up a Bond novel or seen any of the films. I know nothing of the story other than that he's a gunslinging MI6 agent who sleeps with lots of women. Do I have a hope of answering this puzzle correctly? – Rand al'Thor May 02 '15 at 19:08
  • You mentioned 2 points about him "gunslinging" & "women". If you could list around 8 such points, then yes, you could solve the puzzle, but Do look at the tags. – Prem May 02 '15 at 19:12
  • 3
    The username is Bond, James Bond. – leoll2 May 02 '15 at 19:13
  • 2
    You edited in a new tag! Well, I know next to nothing of Bond and not much of computers. I guess this puzzle is not for me. – Rand al'Thor May 02 '15 at 19:13
  • @randal'thor , your question about Knowledge of Bond prompted me to add the new tag ! It is late night for me, so I will reveal the answer sometime tomorrow, in case nobody gets it. I only hope nobody tries to kill me when I add the answer ! – Prem May 02 '15 at 19:18
  • Spoiler: you will get the right answer even not knowing anything about Bond. Ahahahah! – leoll2 May 02 '15 at 19:19
  • @Prem Let's hope it's not one of those lynch mob puzzles ;-) Good night! – Rand al'Thor May 02 '15 at 19:20
  • @randal'thor , 'squeamish ossifrage' got the correct answer , and I have added some explanations in the comments there. Few others folks have used the critical keywords in their answers , without realizing the significance or the connection. Now , is this case for killing me ? Or is it a lynch mob puzzle ? – Prem May 03 '15 at 07:10
  • 1
    It's pretty bizarre to think that bonds .profile setup would have octal permission setup as 007. The most likely one is, you got that right, 770. Also, most likely, the "highly secure" Linux system would have "chmod rights" restricted to SUDO users only. But hey, this is James Bond after all. – Anjan Biswas May 04 '15 at 07:30
  • @Annjawn , +1 . Yes anything can happen with Bond. I once saw a Bond song video, where one guy is running with a clock counting down from 180 (not sure of the exact time), and I was waiting to see what happens when it reaches 0, but it stopped at 007. – Prem May 04 '15 at 08:48
  • @Annjawn: OMG spoilers!! You totally ruined this for me. – Lightness Races in Orbit May 04 '15 at 23:53
  • @LightnessRacesinOrbit Reading just the question is enough. Nothing here in the comments. ;) – Anjan Biswas May 04 '15 at 23:56
  • @Annjawn: That is incorrect. – Lightness Races in Orbit May 04 '15 at 23:57
  • @LightnessRacesinOrbit unless you are interested in spoilers. – Anjan Biswas May 05 '15 at 00:56
  • I will be adding the exact expected answer to all my puzzles, so that the clues are explained, but if somebody else has got the correct answer, then that will be the "Accepted Answer". – Prem May 09 '15 at 16:50

8 Answers8

83

Well perhaps

he saved the files with the wrong permissions — i.e., 007 (no access for owner or group, but full access for everyone else) instead of 770 (full access for owner and group, no access for anyone else).

(Probably an easy mistake to make when you've had the same code number for over 60 years.)

r3mainer
  • 9,671
  • 4
  • 40
  • 45
  • Why did the hackers get in though? – Rand al'Thor May 02 '15 at 19:44
  • 2
  • 4
    Dat code number though. That's priceless. – gatherer818 May 03 '15 at 01:39
  • 3
    @squeamishossifrage Dammit people, after all we put into Linux D: –  May 03 '15 at 04:06
  • 1
    Bingo , +1 , I used specific words as clues to guide towards the expected answer. In Linux systems , 9 bits represent rwxrwxrwx for user (Bond : no access) group (M,Q,Moneypenny,Etc : no access) and others (hackers : full access) to get 000000111 in binary = 007 in standard octal notation, which, as @squeamishossifrage says, is a 60 year old code imprinted in his mind , influencing his habits. Refer http://en.wikipedia.org/wiki/Modes_%28Unix%29 for further Details. – Prem May 03 '15 at 06:49
  • Regarding FYI 1 : the critical tag was 'joke' , while 'trivia' & 'computer-puzzle' are also relevant. – Prem May 03 '15 at 06:53
  • Regarding FYI 2 : If you had solved the puzzle , then you would also know that the chmod command will help Bond change the file permissions (to 770 or 640 , as per his choices) with http://en.wikipedia.org/wiki/Chmod as a reference , for further Details. – Prem May 03 '15 at 07:02
  • 1
    @Prem Nice puzzle although you don't need to know anything about James Bond besides the fact that he's 007. – pacoverflow May 03 '15 at 08:01
  • @pacoverflow , yes that is common knowledge. Hopefully , even the file permissions concept is also common knowledge, atleast to puzzle solvers. – Prem May 03 '15 at 08:04
  • Well done squeamish! You're the best for computer puzzles :-) – Rand al'Thor May 03 '15 at 10:15
  • @randal'thor , with reference to your previous comment , you too are among the best with 14K reputation points !!!! – Prem May 05 '15 at 06:57
25

Bond isn't the only user who has accidentally typed

chmod -R username files

when they meant to type

chown -R username files

Unfortunately, Bond is the only user for whom typing

chmod -R 007 files

silently has catastrophic results.

  • Well it's highly "UNLIKELY" that bond would have the 'permission' to use 'chown' or as a matter of fact anyone else other than the super admin. – Anjan Biswas May 04 '15 at 07:24
  • @annjawn sudo -R 007 secret_docs.txt instead of sudo chown -R 007 secret_docs.txt – Yakk May 05 '15 at 18:25
3

The cores clues :

Linux :

Interspersed in the text , I have the words "user" + "group" + "other" which , when coupled with Linux , points to file permission.

James Bond :

Common knowledge of James Bond is that he is 007.

Put together :

James Bond set the file permissions to 007 so he (user) could not access, this group could not access, but others got easy access !!!!

Prem
  • 5,144
  • 2
  • 17
  • 55
1

Don't we all have a backdoor ? Magic password functionality from easter-egg source inserted in-stream by the compiler ? (puts on Fark hat) - Was a woman involved ? A double agent in the room at the time ?

Also - if on the internet, one must look to the host, and encryption of the block device, hopefully a steganographic cluster-scrambling filesystem using RAID2 or RAID3 (think amulet halves).

OR were the files the property of the hackers/SPECTRE in the first place (and stolen from them) - presumably they can read their own files ?

mckenzm
  • 121
  • 4
  • Nice thinking. It has a lot of techie-ness, though it does not match the given clues. – Prem May 03 '15 at 10:31
  • 1
    It's the joke/pun requirement that throws me, some humour involved, but so much material. The double entendre ? Bond films wer like episodes of the "A" team for a whille in that there was a "formula" of elements that seemed to be compulsory. – mckenzm May 04 '15 at 18:35
  • Indeed, your answer DOES have the "formula" of elements for a Bond situation !!!! – Prem May 04 '15 at 19:00
0

There are two valid options, in my opinion:

  1. His password was stolen, so the bandits moved the files to their servers. Bond could get back his data by directly facing his enemies or locating enemies' IP.
  2. Hijackers sent a malware into Bond's computer. To recover his data, Bond intercepted the flux of information between his computer and hackers' server, being able to locate them.
leoll2
  • 12,590
  • 3
  • 39
  • 83
  • 1
    (1) Unfortunately, Password stolen will not explain why Bond himself got "No Access" (2) Recovering from malware is not easy, atleast not as easy as "chmod". – Prem May 03 '15 at 10:27
0

The hacker switched their account with a no-login account, which simply refuses to accept login no matter how. The hacker, unfortunately, forgot to switch theirs. Since their account is the only one not 'no-login', 007 found him

Second sentence is possible, if we're talking about double agent.

Realdeo
  • 484
  • 2
  • 12
  • Nice thinking, but . . . If login is the problem, then Bond will not be able to login. He also does not have the login credentials of the hackers. So no easy way to recover. – Prem May 03 '15 at 10:29
-1

I'll have a go at this.

The password to the system is "No Access". All Bond's group needed to do when "No Access" came up on the screen was to type in those very words.

Bond's group didn't realise this, but some of the double agents did, so they hacked it.

Another possibility (making this into something of a trick question - maybe this is what the tag suggests?):

Bond simply authorised the wrong group of people to access his files: those in the country he was operating in rather than those in his home organisation.

In this case, the "out of habit" could mean that this is what he normally does because he's usually operating in his home country. (Apologies if this contradicts Bond canon - I've never read or seen any of it!)

Rand al'Thor
  • 116,845
  • 28
  • 322
  • 627
-3

They've just switched HDDs. Bond's OS was replaced with a similar-looking one. The login screen was easily modified (it's open-source anyway) to send login data to attackers over Internet. They have an original HDD, and use his login data to access its contents. Bond and his colleagues gets "No access", because attackers didn't knew his login data when they made a replacement HDD. If they've modified OS to log in no matter what is the password, this attack could fail, because, for example, paranoid Bond could test wrong password first, and would be thus notified of the attack by the fact he logged in.

So we should remember that

  1. BIOS should be set up to load only from an HDD with a certain serial number. But it's still possible to copy a serial number from the old HDD.
  2. You should remember serial number, because the motherboard or BIOS chip could be replaced too.
  3. Use a good old version of Truecrypt, Bitlocker, whatever. You will see that's not your system by the absence of pre-OS screen. That screen could be falsified too, though.
  4. Even when you have HDD encrypted, you still have a keyboard to be physically hacked (who will notice a little Attiny chip and GPRS transceiver inside?), and anyone can do that if they have access to your workplace when you're absent.
  5. There's a noise out of your VGA cable that can be received several meters around you, so bad guys will see what data you're collecting, and hidden cameras are all around.
  6. Don't ever, EVER leave something or do something anywhere near your enemies.
  7. Don't write any more puzzles with infinite ways to answer like this one.
  • A BIG "-1". Nowhere does this answer match the given clues. There is only one correct answer (with slight variational possibilities) and atleast 2 folks have got it right, and few others have got atleast a few clues. – Prem May 05 '15 at 10:58
  • @Prem Could you elaborate on "nowhere"? – polkovnikov.ph May 05 '15 at 13:38
  • Did you read the question ? Did you also read the accepted answer ? – Prem May 05 '15 at 14:00
  • @Prem Yes, I did. Yes, that answer was a total nonsense. – polkovnikov.ph May 05 '15 at 14:46
  • Now, 25+ folks have upvoted the question & 50+ folks have upvoted the accepted answer, but you are still entitled to your opinions/views. So I would now like to revert my "-1", because there can be no arguments over opinions/views, but that voting is locked. – Prem May 05 '15 at 15:14
  • @Prem Never mind, that's just a vote. I'm hard at mine opinion because that's what security auditors would do, if they've found a likely spy in a company. Much more robust method than depending on failures of the spy. – polkovnikov.ph May 05 '15 at 17:12