lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <D6FF830B-5829-4A25-8CE5-DBEDC40D08D4@caustic.org>
Date: Mon, 12 Nov 2007 09:55:29 -0800
From: johan beisser <jb@...stic.org>
To: Paul Sebastian Ziegler <psz@...erved.de>
Cc: bugtraq@...urityfocus.com,
	full-disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Re: Standing Up Against German Laws - Project HayNeedle


On Nov 10, 2007, at 9:28 AM, Paul Sebastian Ziegler wrote:

> The mechanism is quite easy: It searches Google for random words and
> picks random pages among the results, then spiders from there (well it
> is spidering except that it only follows one URL at a time within a
> session thus simulating a user).

There's a few things wrong with this approach. Most of them were  
outlined by Bruce Schneier when he reviewed "TrackMeNot"[1] last year.

The same issues with TrackMeNot apply to Hayneedle, including  
potential false positives, and list of word combinations that can be  
filtered out easily, and well, the list goes on.



[1] http://www.schneier.com/blog/archives/2006/08/trackmenot_1.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ