lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: felix.roennebeck at gaussvip.com (felix.roennebeck@...ssvip.com)
Subject: JAP back doored


>>Yes every tool can be mis-used in one or another direction. In my eyes 
>>fighting child pornography justifies the step to observe a connection.
>>    
>>
>
>It's just that child pornography is starting to be used as a blanket
>crime which is used to justify increased goverment and police
>survelllience, much like terrorism.  Of course, I don't want anyone
>who is guilty of a crime against children to get away with it, but I
>also don't want my natural feelings regarding the well-being of
>children to be used to monitor otherwise legal activies.  Citizens
>possessing the means to communicate or gather information privately
>is, of course, of great interest to most authories, IMO.
>
Now I think we are pretty close to a dead lock because any legal 
activity is supposed not to be watched but you cannot know wether 
someting is legal without watching it. It is pretty obvious that 
criminals have a special interest in anonymity. In this case care must 
be taken that the data gathered by the government is used exclusively to 
prosecute the suspected criminal.

>>I totally aggree with you that the users should have been informed - 
>>even if it perverts the idea of observation. It is absolutely not ok to 
>>pretend anonymity and not providing it. But Drew was arguing against the 
>>german government and I still think it was correct what they did: They 
>>heard about a crime and tried to prosecute it.
>>    
>>
>
>True, it's just how they tried that concerns me.  At any rate, this
>should be a leason to everyone, don't trust things outside of your
>total control.
>
ACK

>
>
>Azerail
>
>  
>

-- 
Mit freundlichen Gr?ssen / with kind regards


Felix Roennebeck

Senior System Administrator

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

VIP Enterprise 8 | THE POWER OF CONTENT AT WORK
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

Gauss Interprise AG    Phone: +49-40-3250-1590
Weidestr. 120a         Fax:   +49-40-3250-19-1590
D-22083 Hamburg        eMail: Felix.Roennebeck@...ssvip.com
Germany                Web:   http://www.gaussvip.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030825/8aa45344/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ