{"id":4078,"date":"2013-04-25T23:36:02","date_gmt":"2013-04-26T06:36:02","guid":{"rendered":"http:\/\/multimedia.cx\/eggs\/?p=4078"},"modified":"2021-05-25T23:17:50","modified_gmt":"2021-05-26T06:17:50","slug":"alias-artifacts","status":"publish","type":"post","link":"https:\/\/multimedia.cx\/eggs\/alias-artifacts\/","title":{"rendered":"Alias Artifacts"},"content":{"rendered":"<p>Throughout my own life, I have often observed that my own sense of nostalgia has a window that stretches about 10-15 years past from the current moment. Earlier this year, I discovered the show <a href=\"http:\/\/en.wikipedia.org\/wiki\/Alias_(TV_series)\">&#8220;Alias&#8221;<\/a> and watched through the entire series thanks to <a href=\"http:\/\/www.amazon.com\/gp\/product\/B00748NNI2\/\">Amazon Prime Instant Video<\/a> (to be fair, I sort of skimmed the fifth and final season which I found to be horribly dull, or maybe franchise fatigue had set in). The show originally aired from 2001-2006 so I found that it fit well within the aforementioned nostalgia window.<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/Alias-logo.jpg\" alt=\"Alias (TV Series) logo\" width=\"255\" height=\"103\" class=\"aligncenter size-full wp-image-4082\" \/><br \/>\n<\/center><\/p>\n<p>But what was it, exactly, about the show that triggered nostalgia? <strong>The computers, of course!<\/strong> The show revolved around spies and espionage and cutting-edge technology necessarily played a role. The production designer for the series must have decided that <em>Unix\/Linux == awesome hacking<\/em> and so many screenshots featured Linux.<\/p>\n<p>Since this is still nominally a multimedia blog, I&#8217;ll start of the screenshot recon with an old multimedia player. Here is a vintage Mac OS desktop running an ancient web browser (probably Netscape) that&#8217;s playing a full-window video (probably QuickTime embedded directly into the browser). <\/p>\n<p><center><br \/>\n<div id=\"attachment_4085\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-macos-browser-video.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4085\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-macos-browser-video-300x199.jpg\" alt=\"Old Mac OS with old browser\" width=\"300\" height=\"199\" class=\"size-medium wp-image-4085\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-macos-browser-video-300x199.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-macos-browser-video.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4085\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>Let&#8217;s jump right into the Linux side of things. This screenshot makes me particularly sentimental since this is exactly what a stock Linux\/KDE desktop looked like circa 2001-2003 and is more or less what I would have worked with on my home computer at the time:<\/p>\n<p><center><br \/>\n<div id=\"attachment_4087\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-linux-kde-desktop.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4087\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-linux-kde-desktop-300x216.jpg\" alt=\"Alias: Linux\/KDE desktop\" width=\"300\" height=\"216\" class=\"size-medium wp-image-4087\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-linux-kde-desktop-300x216.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-linux-kde-desktop.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4087\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>Studying that screenshot, we see that the user logs in as root, even to the desktop environment. Poor security practice; I would expect better from a bunch of spooks.<\/p>\n<p><!--more--><\/p>\n<p><strong>Echelon<\/strong><br \/>\nLook at the terminal output in the above screenshot&#8211; it&#8217;s building a program named Echelon, an omniscient spy tool inspired by <a href=\"http:\/\/en.wikipedia.org\/wiki\/ECHELON\">a real-world surveillance network of the same name<\/a>. In the show, Echelon is used to supply plot-convenient intelligence. At one point, some antagonists get their hands on the Echelon source code and seek to compile it. When they do, they will have access to the vast surveillance network. If you know anything about how computers work, don&#8217;t think about that too hard.<\/p>\n<p>Anyway, it&#8217;s interesting to note that Echelon is a properly <a href=\"http:\/\/en.wikipedia.org\/wiki\/GNU_build_system\">autotool&#8217;d<\/a> program&#8211; when the bad guys finally got Echelon, installation was just a &#8216;make install&#8217; command away. The compilation was very user-friendly, though, as it would pop up a nice dialog box showing build progress:<\/p>\n<p><center><br \/>\n<div id=\"attachment_4089\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-compiling.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4089\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-compiling-300x200.jpg\" alt=\"Alias: Compiling Echelon\" width=\"300\" height=\"200\" class=\"size-medium wp-image-4089\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-compiling-300x200.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-compiling.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4089\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>Examining the build lines in both that screenshot and the following lines, we can see that Echelon cares about files such as common\/db_err.c and bt_curadj.c:<\/p>\n<p><center><br \/>\n<div id=\"attachment_4090\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-berkeleydb.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4090\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-berkeleydb-300x187.jpg\" alt=\"Alias: Echelon used Berkeley DB\" width=\"300\" height=\"187\" class=\"size-medium wp-image-4090\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-berkeleydb-300x187.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-berkeleydb.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4090\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>A little googling reveals that these files both belong to the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Berkeley_DB\">Berkeley DB library<\/a>. That works; I can imagine a program like this leveraging various database packages.<\/p>\n<p><strong>Computer Languages<\/strong><br \/>\nThe Echelon source code stuff comes from episode 2.11: &#8220;A Higher Echelon&#8221;. While one faction had gotten a hold of the actual Echelon source code, a rival faction had abducted the show&#8217;s resident uber-nerd and, learning that they didn&#8217;t actually receive the Echelon code, force the nerd to <em>re-write<\/em> Echelon from scratch. <strong>Which he then proceeds to do&#8230;<\/strong><\/p>\n<p><center><br \/>\n<div id=\"attachment_4096\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-rewriting-echelon.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4096\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-rewriting-echelon-300x197.jpg\" alt=\"Alias: Rewriting Echelon\" width=\"300\" height=\"197\" class=\"size-medium wp-image-4096\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-rewriting-echelon-300x197.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-rewriting-echelon.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4096\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>The code he&#8217;s examining there appears to be C code that has something to do with joystick programming (JS_X_0, JS_Y_1, etc.). An eagle-eyed <a href=\"http:\/\/www.imdb.com\/title\/tt0508584\/trivia\">IMDb user contributed the trivia<\/a> that he is looking at the file \/usr\/include\/Linux\/joystick.h.<\/p>\n<p>Getting back to the plot, how could the bad buys possibly expect him to re-write a hugely complex piece of software from scratch? You might think this is the height of absurdity for a computer-oriented story. You&#8217;ll be pleased to know that the writers agreed with that assessment since, when the program was actually executed, it claimed to be Echelon, but that broke into a game of Pong (or some simple game). Suddenly, it makes perfect sense why the guy was looking at the joystick header file.<\/p>\n<p>This is the first bit of computer-oriented fun that I captured when I was watching the series:<\/p>\n<p><center><br \/>\n<div id=\"attachment_4097\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-mainframe-java.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4097\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-mainframe-java-300x179.jpg\" alt=\"Alias: Java on the mainframe\" width=\"300\" height=\"179\" class=\"size-medium wp-image-4097\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-mainframe-java-300x179.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-mainframe-java-1024x611.jpg 1024w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-mainframe-java.jpg 1421w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4097\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>This printout purports to be a &#8220;mainframe log summary&#8221;. After some plot-advancing text about a security issue, it proceeds to dump out some Java source code.<\/p>\n<p><strong>SSH<\/strong><br \/>\n<a href=\"http:\/\/en.wikipedia.org\/wiki\/Secure_Shell\">Secure Shell (SSH)<\/a> frequently showed up. Here&#8217;s a screenshot in which a verbose &#8216;ssh -v&#8217; connection has just been closed, while a telnet command has apparently just been launched (evidenced by &#8220;Escape character is &#8216;^]&#8217;.&#8221;):<\/p>\n<p><center><br \/>\n<div id=\"attachment_4092\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ssh-telnet-database.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4092\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ssh-telnet-database-300x160.jpg\" alt=\"Alias: SSH\/telnet\" width=\"300\" height=\"160\" class=\"size-medium wp-image-4092\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ssh-telnet-database-300x160.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ssh-telnet-database.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4092\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>This is followed by some good old <a href=\"http:\/\/tvtropes.org\/pmwiki\/pmwiki.php\/Main\/HollywoodHacking\">Hollywood Hacking<\/a> in which a free-form database command is entered through any available command line interface:<\/p>\n<p><center><br \/>\n<div id=\"attachment_4093\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-command-line-db.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4093\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-command-line-db-300x145.jpg\" alt=\"Alias: Intuitive command line interface\" width=\"300\" height=\"145\" class=\"size-medium wp-image-4093\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-command-line-db-300x145.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-echelon-command-line-db.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4093\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>I don&#8217;t remember the episode details, but I&#8217;m pretty sure the output made perfect sense to the character typing the command. Here&#8217;s another screenshot where the SSH client pops up an extra-large GUI dialog element to notify the user that it&#8217;s currently negotiating with the host:<\/p>\n<p><center><br \/>\n<div id=\"attachment_4094\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ssh-negotiating.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4094\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ssh-negotiating-300x246.jpg\" alt=\"Alias: SSH negotiation dialog\" width=\"300\" height=\"246\" class=\"size-medium wp-image-4094\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ssh-negotiating-300x246.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ssh-negotiating.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4094\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>Now that I look at that screenshot a little more closely, it appears to be a Win95\/98 program. I wonder if there was an SSH client that actually popped up that gaudy dialog.<\/p>\n<p>There&#8217;s a lot of gibberish in this screenshot and I wish I had written down some details about what it represented according to the episode&#8217;s plot:<\/p>\n<p><center><br \/>\n<div id=\"attachment_4099\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-public-key.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4099\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-public-key-300x191.jpg\" alt=\"Alias: Public key\" width=\"300\" height=\"191\" class=\"size-medium wp-image-4099\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-public-key-300x191.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-public-key.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4099\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>It almost sounds like they were trying to break into a network computer. Analyzing MD5 structure&#8230; public key synthesized. To me, the funniest feature is the 7-digit public key. I&#8217;m a bit rusty on the math of the RSA cryptosystem, but intuitively, it seems that the public and private keys need to be of roughly equal lengths. I.e., the private key in this scenario would also be 7 digits long.<\/p>\n<p><strong>Gadgets<\/strong><br \/>\nVarious devices and gadgets were seen at various junctures in the show. Here&#8217;s a tablet computer from back when tablet computers seemed like fantastical (albeit stylus-requiring) devices&#8211; the Fujitsu Stylistic 2300:<\/p>\n<p><center><br \/>\n<div id=\"attachment_4100\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-fujitsu-stylistic-2300-tablet.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4100\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-fujitsu-stylistic-2300-tablet-300x180.jpg\" alt=\"Alias: Fujitsu Stylistic 2300 tablet\" width=\"300\" height=\"180\" class=\"size-medium wp-image-4100\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-fujitsu-stylistic-2300-tablet-300x180.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-fujitsu-stylistic-2300-tablet.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4100\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>Here&#8217;s a videophone from an episode that aired in 2005. The specific model is <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,1834548,00.asp\">the Packet8 DV326 (MSRP of US$500)<\/a>. As you can see from the screenshot, it can do 384 kbps both down <em>and<\/em> up.<\/p>\n<p><center><br \/>\n<div id=\"attachment_4101\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-dv326-videophone.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4101\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-dv326-videophone-300x191.jpg\" alt=\"Alias: Packet8 DV326\" width=\"300\" height=\"191\" class=\"size-medium wp-image-4101\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-dv326-videophone-300x191.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-dv326-videophone.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4101\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>I really regret not writing down the episode details surrounding this gadget. I just know that it was critical that the good guys get it and keep from falling into the hands of the bad guys.<\/p>\n<p><center><br \/>\n<div id=\"attachment_4102\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-samsung-lexar.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4102\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-samsung-lexar-300x196.jpg\" alt=\"Alias: Gadget using Samsung and Lexar chips\" width=\"300\" height=\"196\" class=\"size-medium wp-image-4102\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-samsung-lexar-300x196.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-samsung-lexar.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4102\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>As you can see, the (presumably) deadly device contains a Samsung chip and a Lexar chip. I have to wonder what device the production crew salvaged this from (probably just an old cell phone).<\/p>\n<p><strong>Other Programs<\/strong><\/p>\n<p>The GIMP photo editor makes an appearance while scrubbing security camera footage, and serves as the magical <a href=\"http:\/\/tvtropes.org\/pmwiki\/pmwiki.php\/Main\/EnhanceButton\">Enhance Button<\/a> (at least they slung around the term &#8220;gamma&#8221;):<\/p>\n<p><center><br \/>\n<div id=\"attachment_4103\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-gimp-editor.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4103\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-gimp-editor-300x197.jpg\" alt=\"Alias: GIMP editor\" width=\"300\" height=\"197\" class=\"size-medium wp-image-4103\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-gimp-editor-300x197.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-gimp-editor-1024x674.jpg 1024w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-gimp-editor.jpg 1467w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4103\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>I have no idea what MacOS-based audio editing program this is. Any ideas?<\/p>\n<p><center><br \/>\n<div id=\"attachment_4105\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-apple-audio-editor.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4105\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-apple-audio-editor-300x197.jpg\" alt=\"Alias: Apple MacOS-based audio editor\" width=\"300\" height=\"197\" class=\"size-medium wp-image-4105\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-apple-audio-editor-300x197.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-apple-audio-editor.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4105\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n<p>FTP shows up in episode 2.12, &#8220;The Getaway&#8221;. It&#8217;s described as a &#8220;secure channel&#8221; for communication, which is quite humorous to anyone versed in internet technology.<\/p>\n<p><center><br \/>\n<div id=\"attachment_4106\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ftp-secure-message.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4106\" src=\"http:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ftp-secure-message-300x197.jpg\" alt=\"Alias: FTP secure channel\" width=\"300\" height=\"197\" class=\"size-medium wp-image-4106\" srcset=\"https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ftp-secure-message-300x197.jpg 300w, https:\/\/multimedia.cx\/eggs\/wp-content\/uploads\/2013\/04\/alias-ftp-secure-message.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4106\" class=\"wp-caption-text\">Click for larger image<\/p><\/div><br \/>\n<\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reminiscing about older computer technology through the old TV show &#8220;Alias&#8221;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4078","post","type-post","status-publish","format-standard","hentry","category-general"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/4078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/comments?post=4078"}],"version-history":[{"count":20,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/4078\/revisions"}],"predecessor-version":[{"id":4689,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/4078\/revisions\/4689"}],"wp:attachment":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/media?parent=4078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/categories?post=4078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/tags?post=4078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}