<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Phantom_Access</id>
	<title>Phantom Access - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Phantom_Access"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Phantom_Access&amp;action=history"/>
	<updated>2026-05-04T21:22:29Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=Phantom_Access&amp;diff=3471627&amp;oldid=prev</id>
		<title>imported&gt;BD2412: /* History */ Clean up spacing around commas and other punctuation fixes, replaced: ,.&lt;ref&gt; → .&lt;ref&gt;</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Phantom_Access&amp;diff=3471627&amp;oldid=prev"/>
		<updated>2025-06-12T18:05:42Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;History: &lt;/span&gt; Clean up spacing around commas and other punctuation fixes, replaced: ,.&amp;lt;ref&amp;gt; → .&amp;lt;ref&amp;gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Series of hacking programs for Apple II}}&lt;br /&gt;
[[Image:Paccess1.jpg|thumb|333px|right|Phantom Access 5.7K title page, featuring a confused [[TIE fighter]] in front of a [[Death Star]] and the post-divestiture [[AT&amp;amp;T]] &amp;quot;death star&amp;quot; logo.]]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Phantom Access&amp;#039;&amp;#039;&amp;#039; was the name given to a series of hacking programs written by [[Patrick Kroupa]] (a.k.a., [[Lord Digital]]) of [[Legion of Doom (hacker group)|LOD]]. The programs were worked on during the early to mid-1980s (1982–1986), and designed to run on the [[Apple II]] computer and [[Novation CAT#The Apple-CAT II|Apple-Cat]] [[modem]].&lt;br /&gt;
&lt;br /&gt;
== History ==&lt;br /&gt;
There are a variety of references to the Phantom Access programs in texts from underground [[bulletin board system]]s from the 1980s.&amp;lt;ref&amp;gt;{{cite web |url=http://www.totse.com/en/ego/no_laughing_matter/elitecmt.html |title=Totse.com &amp;amp;#124; the Elite Commandments - very amusing! |accessdate=2006-09-02 |url-status=dead |archiveurl=https://web.archive.org/web/20070929083947/http://www.totse.com/en/ego/no_laughing_matter/elitecmt.html |archivedate=2007-09-29 }}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web|url=http://www.skepticfiles.org/cowtext/100/lozershu.htm|title = Defaulters – if You See Something, Say Something| date=9 August 2024 }}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://p.ulh.as/phrack/p42/P42-03.html{{dead link|date=March 2018 |bot=InternetArchiveBot |fix-attempted=yes }}&amp;lt;/ref&amp;gt; Reading the files and messages, it appears that the Phantom Access name was a given to an entire series of programs coded by Lord Digital and apparently for internal LOD use, because the programs were not distributed to the &amp;quot;public&amp;quot; or even most other members of the [[Hacker (computer security)|hacker]] [[Electronic underground community|underground]] of the time.&lt;br /&gt;
&lt;br /&gt;
Much like [[Festering Hate]], there are references to the programs in a variety of mainstream press articles of the early and mid 90s when [[MindVox]] first came online.&amp;lt;ref&amp;gt;[http://www.mindvox.com/staticpage/Media/Wired1.html MindVox: Urban Attitude Online] {{webarchive|url=https://archive.today/20120905003917/http://www.mindvox.com/staticpage/Media/Wired1.html |date=2012-09-05 }} Wired Magazine, Volume 1, Issue 5, November 1993&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;[http://www.phantom.com/staticpage/Akashic/Mondo2k1.html There&amp;#039;s a Party in My Mind: MindVox!] {{webarchive|url=https://archive.today/20120909034426/http://www.phantom.com/staticpage/Akashic/Mondo2k1.html |date=2012-09-09 }} Mondo 2000, Issue 8, 1992&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;[http://www.phantom.com/staticpage/Media/SFF.html Trading Data with Dead &amp;amp; Digital] {{webarchive|url=https://archive.today/20120909085259/http://www.phantom.com/staticpage/Media/SFF.html |date=2012-09-09 }} by [[Charles Platt (science-fiction author)|Charles Platt]], The Magazine of Fantasy &amp;amp; Science Fiction, 1994&amp;lt;/ref&amp;gt; Phantom Access is also where the parent company that launched MindVox, [[Phantom Access Technologies]], took its name from.&lt;br /&gt;
&lt;br /&gt;
== Program Content ==&lt;br /&gt;
Despite obviously being made for internal (rather than public/commercial) release, Phantom Access contains many of the qualities that would be more expected of a commercial release.  The use of graphics (including animation), utility programs, extensive formatted documentation and sample &amp;quot;sub-modules&amp;quot; which contain instructions for the Phantom Access program itself is unusual for a program of this kind at this time due to the amount of work involved in setting up those elements when the expectation would be that the limited user-base would be able to manage without them.  In addition to the functional aspects of the program there was also bundled [[Easter egg (media)|easter egg]] type media such as random poems, and [[Pink Floyd]] lyrics.&lt;br /&gt;
&lt;br /&gt;
== Phantom Access 5.7K ==&lt;br /&gt;
The Phantom Access disks that were leaked, contained one full [[Disk II|Apple II disk]] side of software and an additional disk of documentation written about the programs.&amp;lt;ref&amp;gt;[http://www.textfiles.com/exhibits/paccess/Phantom-Access-Docs.DSK Phantom Access Disk 2 (Documentation) Image] (Retrieved from [[Textfiles.com]])&amp;lt;/ref&amp;gt; There is another text archive of messages from the era that were apparently posted when Phantom Access was leaked to The Underground BBS in the late 80s.&amp;lt;ref&amp;gt;[http://www.textfiles.com/exhibits/paccess/PhantomAccess.txt Phantom Access related messages, from the late 80s] (Retrieved from [[Textfiles.com]])&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The programs come on a disk formatted with ZDOS (Zilog DOS), a common operating system used with a [[Zilog Z80|Z80]] co-processor add-on to the Apple II.&amp;lt;ref&amp;gt;{{Cite web| url=http://www.textfiles.com/bitsavers/pdf/zilog/mcz-1/03-0072-01A_Z80_RIO_Operating_System_Users_Manual_Sep78.pdf | title=Z80:RIO Operating System User&amp;#039;s Manual | access-date=2018-09-15 | archive-date=2017-03-28 | archive-url=https://web.archive.org/web/20170328011910/http://www.textfiles.com/bitsavers/pdf/zilog/mcz-1/03-0072-01A_Z80_RIO_Operating_System_Users_Manual_Sep78.pdf | url-status=dead}}&amp;lt;/ref&amp;gt; Messages from the era indicate that the Phantom Access leak may contain a virus, and taking into account [[Festering Hate]], it is certainly possible.&lt;br /&gt;
{| align=center&lt;br /&gt;
| &amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=&lt;br /&gt;
%   )=-&amp;gt; PHANTOM ACCESS [5.7K] &amp;lt;-=(   %&lt;br /&gt;
=/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/=&lt;br /&gt;
%  (C)opyright 1982-86, Lord Digital  %&lt;br /&gt;
=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=&lt;br /&gt;
           (Sub-Module Loaded)&lt;br /&gt;
/:::::::::::::::::::::::::::::::::::::\&lt;br /&gt;
:                                     :&lt;br /&gt;
: [Code File]:[Filename For Save]     :&lt;br /&gt;
: [Now Testing Code]:[012345]         :&lt;br /&gt;
: [Total Codes Scanned]:[1234]        :&lt;br /&gt;
: [Valid Codes Scanned]:[99]          :&lt;br /&gt;
: [Last Valid Code]:[012345]          :&lt;br /&gt;
:                                     :&lt;br /&gt;
-:::::::::::[System Status]:::::::::::-&lt;br /&gt;
:                                     :&lt;br /&gt;
: [SND][PHN][PCN][OCC][RNG][---][SEQ] :&lt;br /&gt;
: [%][  Current Function Active  ][%] :&lt;br /&gt;
:             [Block]:[-]             :&lt;br /&gt;
:      [Audio Duration]:[00]:000      :&lt;br /&gt;
:    [Time Left In Audio Test]:[-]    :&lt;br /&gt;
:.....................................:&lt;br /&gt;
\Type [ESC] to Exit After Current Code/&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Phantom Access itself appears to be a highly-programmable common interface, which follows instructions contained in a variety of files. At the topmost level it seems to be a toolkit for utilizing all the special functions of the Apple-Cat modem, it scans systems, hacks codes, functions as a [[blue box]], and exports the results into a series of files which can be manipulated using all the other programs in the series.&lt;br /&gt;
&lt;br /&gt;
A quote from the Phantom Access Documentation:&lt;br /&gt;
&lt;br /&gt;
:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;Phantom Access 5.7K is the hacker itself. It could be described as the final processing unit of the instruction sets, but without the utilities it would be useless to the end user, as that is ALL it is. Sub-Modules must already exist prior to usage. This was a necessary compromise, as there is NO memory left on a 64K system once the Slider&amp;#039;s and Rotation system are activated.&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
It uses [[Execution (computing)|EXEC]] files as a form of primitive scripting for the Apple II. Reading through the messages of the era,&amp;lt;ref&amp;gt;{{Cite web| title=Type ABT Phantom access | format=TXT | url=http://www.textfiles.com/exhibits/paccess/PhantomAccess.txt | archive-url=https://web.archive.org/web/20060815195714/http://www.textfiles.com:80/exhibits/paccess/PhantomAccess.txt | archive-date=2006-08-15}}&amp;lt;/ref&amp;gt; the scripts are doing direct writes to various [[Hardware register|registers]] and parts of [[Memory-mapped I/O|memory]] using the [[PEEK and POKE|POKE]] command. The programs regularly check memory to see what is running or loaded and generally seem to take over control of the computer.&lt;br /&gt;
&lt;br /&gt;
== Final Evolution ==&lt;br /&gt;
Lacking an Apple II computer and Apple-Cat modem, in addition to their historical value, perhaps the most useful and interesting part of the Phantom Access programs is the extensive documentation Kroupa wrote.&amp;lt;ref&amp;gt;[http://www.textfiles.com/exhibits/paccess/PhantomDocs.txt Phantom Access Documentation (converted to text)] (Retrieved from [[Textfiles.com]])&amp;lt;/ref&amp;gt; In addition to explaining how to program the sub-modules, the documents provide an extensive overview of phreaking information, information about the other programs in the Phantom Access series (which appear to have been other system penetration tools and [[rootkit]]s, before the term &amp;quot;rootkit&amp;quot; existed), and the eventual goal of the whole series, which seems to have been turning the entire Apple II computer and Apple-Cat modem into a programmable phreaking box, which could be plugged into the computers Kroupa and other LOD members were abandoning the Apple platform and switching over to ([[NeXT]], [[Sun Microsystems|Sun]] and [[Silicon Graphics|SGI]] hardware).&amp;lt;ref&amp;gt;[http://www.phantom.com/staticpage/Akashic/Voices.html Voices in My Head: MindVox The Overture] {{Webarchive|url=https://archive.today/20120906132553/http://www.phantom.com/staticpage/Akashic/Voices.html |date=2012-09-06 }} by [[Patrick Kroupa]], 1992&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
From the Phantom Access documentation:&lt;br /&gt;
&lt;br /&gt;
:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;The eventual goal of Phantom Access was to realize a fully automated system for the Apple-Cat modem. The sound sampling and evaluation system has been almost unchanged from revision 4.0 to 5.7 of the series, everything else has been rewritten several times. The final 6.6 revision is a full implementation of the original design (read: it has very little in common with anything in the 5.7 series) with a final processor that is capable of passing data through the Apple-Cat&amp;#039;s serial port to an external machine, thus allowing use of the entire Apple computer system as nothing more than a very sophisticated auxiliary modem.&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Towards the late 80s, it looks like Kroupa and LOD had exactly one use left for the Apple II: to utilize the entire computer as a host for the Apple-Cat modem. This makes a very strong statement about how highly valued [[Novation CAT|Novation&amp;#039;s]], Apple-Cat modem was amongst [[Phreaking|phone phreaks]].&lt;br /&gt;
&lt;br /&gt;
:&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;This was my solution to working within the Apple&amp;#039;s limits. No other modem comes close to having the Apple-Cat&amp;#039;s capabilities, but the Apple itself leaves much to be desired.&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==Historical Exhibit==&lt;br /&gt;
Due to its nature as a product designed for a limited set of users, Phantom Access remained extremely obscure to the general public until it was featured by [[historian|digital historian]] and [[film-maker]], [[Jason Scott Sadofsky|Jason Scott]] as the first exhibit on [[textfiles.com]], in January 2006.&amp;lt;ref&amp;gt;[http://ascii.textfiles.com/archives/000188.html Introduction of Phantom Access Exhibit, by Jason Scott] {{webarchive|url=https://web.archive.org/web/20060824055252/http://ascii.textfiles.com/archives/000188.html |date=2006-08-24 }} (Retrieved from [[Textfiles.com]])&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://www.textfiles.com/exhibits/paccess/ Phantom Access Exhibit]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
{{MindVox}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Wikipedia articles with ASCII art]]&lt;br /&gt;
[[Category:MindVox]]&lt;br /&gt;
[[Category:Legion of Doom (hacker group)]]&lt;br /&gt;
[[Category:Phreaking]]&lt;/div&gt;</summary>
		<author><name>imported&gt;BD2412</name></author>
	</entry>
</feed>