lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: kindergarten at hush.com (kindergarten@...h.com) Subject: RE: Winnie The Pooh Hacking Squadron Presents: 0day 31337 vulnerability in indent 2.2.9 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Good morning world, > [6] FLAMES, SHOUTOUTS and FINAL NOTES > > ... > > *) no, Stefan Esser, you can't steal our juarez and public it > as your own, because you are to stupid to own us. I can understand your point in hating him, because he released some 0day things like CVS double free. But isn't it a bit megalomaniac to accuse one of the TESO exploit coders of stealing and leaking other one's warez? Especially when everyone knew that TESO had found these exploits, too? Oh yeah and a happy new year to everyone out there. Dr. Kindergarten -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.3 wkYEARECAAYFAj/y2VcACgkQDPytG5UCIA1fQACgjXFWgCXTzcYHStt8rl5UY42Ng5cA nRvY/0qDVLAI3QJhRJky821CGpY/ =GSJG -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger https://www.hushmail.com/services.php?subloc=messenger&l=434 Promote security and make money with the Hushmail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427
Powered by blists - more mailing lists