lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200302130100.41932.aeonflux@aeonflux.no-ip.com>
From: aeonflux at aeonflux.no-ip.com (aeonflux)
Subject: Unusual request

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wednesday 12 February 2003 8:49 pm, yossarian wrote:
> Well, ahm, I said considered illegal by some people, I was referring to the
> lines in the Cybercrime Treaty on disclosing information that CAN be used
> for illegal activities. That is why I just gave an URL - allthough I
> believe Paul to be an honest person, I cannot verify if his intentions are
> 100% legal, nor that he sent the e-mail, nor that he is the only person
> reading the mail. The treaty does not go into forums or mailinglists. The
> information passed on this forum might well be used for any / some of the
> offences covered by the treaty. IF any info on this forum is linked to a
> specific case in court, ALL subscribers of course will be suspects. Now
> that TIA is on hold, how are they ever gonna catch the bad guys posing as
> security specialists? And how am I to know everybody reading this list, or
> any of the one-line archives, is not a criminal?
Regardless, everyone and there dog knows about the unicode directory traversal 
exploit.  It was actually demostrated live on "the screen savers" on techtv.  
I think you're safe handing out this information.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+SyZ41mDajpZ9rHwRAp0vAJ0edNT6XRgZMyUw+xx5Myp0cCl8EQCgtQ2x
Qwwgw9wvc+SdkZklPyLlkQQ=
=BGK1
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ