lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 31 Mar 2014 12:10:44 -0700
From: Jack Morgan <kuriosly@...il.com>
To: "J. Oquendo" <joquendo@...ensive.net>
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] Introducing APSAM - Beyond Military Grade Security

I fear that its too late for AP$AM. I believe it has already been
compromised by the true foe. After all, It has been turned from a possible
beacon of safety in these troubled times, to yet another harbour for those
"Nation-States" to slither into and out of our systems like the foe they
are. After all, can we yet trust that which has none?


On Mon, Mar 31, 2014 at 5:18 AM, J. Oquendo <joquendo@...ensive.net> wrote:

> Security researchers develop AP$AM the most advanced, and
> persistent, threat information valuation services.
>
> In an effort to combat advanced, malicious hackers
> worldwide, researchers have developed a unique, and proven
> methodology to locate and attribute, high level,
> sophisticated attacks.
>
> "We see nation states all the time. They come in and out
> of networks, lurking like ghosts. They're advanced,
> they're persistent, and they likely have nuclear cyber
> packets. Some even have horrific names like UglyGorilla.
> They seem to ONLY emanate from China, and when they don't
> we quickly re-assess, and re-label them as Chinese. It's
> slowly becoming Cyber Pearl Harbor. From China!. An
> electronic cybergeddon" said Patrick Kilpatrick, a Senior
> Suicidal Security Engineer.
>
> AP$AM allows for digital, analog, and electronic
> processing of mission critical information. The secret is
> in the patent pending $uper Holistic Intelligence and
> Techniques approach we use to mitigate against threats
> from the cloud, mobile, radar, telekinetic, and Von Eck
> threats. AP$AM contains CyBOX, MAEC, CAPEC, STIX, and
> TAXII capabilities which are answered in the FAQs
>
> http://apsam.infiltrated.net/faqs.html
>
> US based Infiltrated Networks founded in 2004, is a
> boutique security, and research group composed of one
> individual, and his personas. They are internationally
> known, to rock a microphone.
>
> http://apsam.infiltrated.net/
>
>
> --
> =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
> J. Oquendo
> SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP, GREM
>
> "Where ignorance is our master, there is no possibility of
> real peace" - Dalai Lama
>
> 42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
> http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x2BF7D83F210A95AF
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> http://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/
>

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists