Feeds

Blowjob-assisted hack defies logic

RSA hack scene in Swordfish sticks in our throat

  • alert
  • submit to reddit

Boost IT visibility and business value

Our story about a scene in Swordfish where a hacker, played by X-Men star Hugh Jackman, has to hack a system while having a gun pressed against his temple and getting a blow job has produced some interesting feedback.

Vulture eyed Reg readers spotted that in the film Jackman hacked RSA's 128-bit RC5 algorithm in a little over a minute, despite the fact that such a feat would normally take a network of computers years of computational time.

So let's get this straight. What the film is suggesting is that using just his nimble hands, and with the tender administrations of a lovely lady, a hacker can achieve a mathematical feat in seconds, and on Dell laptop, that would take a supercomputer network months.

Unless we're dealing in time-lapse photography - and Jackman's character held off blowing his load for four months (using tantric sex, perhaps) - we're asked to believe this ridiculous nonsense. You can only take willing suspension of disbelief so far...

What's surprising here is that RSA Security has its logo prominently displayed on the movie's official site and has a click through to its own home page where it proudly announced that it had advised the film's makers about encryption "so they would know how a computer system's security could be protected as well as compromised or 'hacked'."

Sorry guy's but I don't think the message got through, and we're not quiet sure how this fits in with RSA Security being the most "trusted name in esecurity" either.

As Reg reader Nick Garcia observes: "I'm not sure how comforting it would be to know that a hacker who hasn't touched a computer in years (and uses Microsoft's Visual Virus Studio) and motivated by a blowjob at gunpoint can crack it [RSA] in 45 seconds." Quite.

RSA Security isn't the only technology firm that features in Swordfish, and the Jackman character's prestigious hack is performed on a Dell laptop, which makes a change from the Apple PowerBook that was used crashing AlienOS with a worm in Independence Day.

The movie still falls into the familiar trap that filmmakers always seem to fall into. In order to make computers seem more interesting directors ignore the advice of technical advisors on how they actually work. Oh well, that's Hollywood!

Swordfish goes on general release in the UK tomorrow (Friday, July 27). ®

External Links

Official site for the movie Swordfish
RSA factoring challenge

Related Stories

Can you hack while getting a blow job?
RSA poses $200,000 crypto challenge

Boost IT visibility and business value

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?