lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: farkle at hushmail.com (farkle@...hmail.com)
Subject: re: rant by fooldisclosure

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



fooldisclosure@...hmail.com wrote:
<snip>

> 1. Owning as many US .gov, .mil and .us systems as possible.
> 2. Removing or corrupting as much US government data as possible.
> 3. Causing physical damage to hardware via software.
>
> Result: fear, instability and technological uncertainty. Financial loss. HR Loss. Loss of confidence, respect. Data loss.
>
> It doesn't matter whether you own and destroy fw1console.af.mil, spacelink.nasa.gov, or
> somewin95box.hicktown.k12.us.

Myopia is an odd thing. Do you really, personally belive knocking down some nine graders PWS box is going to do squick? What's the point?

Your ranting is misplaced, but obviously is that of a desperate, lonely and ill informed n00b. Sorry, but that's the truth.

Hitting .gov, .mil stuff is ballsy, and frankly pretty stoopid. You will be caught. And being caught, would likely suck. You advocate that? You first.

Fucking with the .us TLD is just dumb. Pathetic. These have nothing, ZERO to do with anything really governmental. Jeez, some of the first domains (and the best of the smart, non-corporate cool ones) in the US were .us based. Or perhaps that was before your time.

If you REALLY want to fuck with the govt. (a legitimate task) perhaps you should actually rise from your keyboard and GO FUCKING VOTE. Oh. Sorry. That might require work beyond your cave.

- -jim
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wlsEARECABsFAj2FcRoUHGZhcmtsZUBodXNobWFpbC5jb20ACgkQ926Yn3BezHbiFACb
BqszCwQMym0jp6I5Oo64/jd2gI0An3UF93MLOOjFlPs9ojk9HLW3ETRi
=OXCC
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ