lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 15 Apr 2008 02:34:01 +0100
From: n3td3v <xploitable@...il.com>
To: Valdis.Kletnieks@...edu, "The Dark Tangent" <dtangent@...con.org>, 
	n3td3v <n3td3v@...glegroups.com>, full-disclosure@...ts.grok.org.uk
Subject: Re: DEF CON 16 Retro Announcement! Back to Bang!

On Tue, Apr 15, 2008 at 2:04 AM,  <Valdis.Kletnieks@...edu> wrote:
> On Tue, 15 Apr 2008 01:57:18 BST, you said:
>  > On Sun, Apr 13, 2008 at 4:23 AM,  <Valdis.Kletnieks@...edu> wrote:
>  > > On Sat, 12 Apr 2008 17:06:28 BST, n3td3v said:
>  > >
>  > >  > Any criminal hackers who go are just stupid and don't realise what
>  > >  > they are actually attending.
>  > >  >
>  > >  > The U.S Security Services will have hidden cameras and befrienders in
>  > >  > place to grab as much information out of people as possible.
>  > >  >
>  > >  > These conferences have just turned into a 'human honeypot' for the
>  > >  > intelligence services.
>
>
> > So, because a real world terrorist clone of Def Con wouldn't work, the
>  > same goes for Def Con "human honeypot"ing of ---cyber terrorists, who
>  > are today the direct threat to corporations and government, not the
>  > once before believed bedroom hacker of which Def Con originally was
>  > formed from.
>
>  Dood, you need to make up your mind - is infiltration of cons by govt
>  security the Next Big Thing, or already played out?  You can't have it
>  both ways, choose one and stick with it.

Perhaps the public belief that security conferences are monitored, and
the public admission by the government that security conferences are
monitored, has killed the original idealology of security conferences?

And thats why these conferences have turn into--not a useful tool for
the security communty to meet and greet, but a commercial tool for the
security industry and an reconnaissance tool for the government...
which overscores what security conferences were originally built for.

For the humble hacker, the pros and cons of going are outweighed...

n3td3v

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ