lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: alerta at redsegura.com (Alerta Redsegura)
Subject: leaking



>The original poster said "track" not "collect" email addresses

No no, he said: "The beatch [sic] is probably collecting our addresses for
spam".

>I don't think in this case you could (unless you were either matching IPs,
or
>there is other information in the request that certain MUAs give out)

Exactly, it's good to be paranoid, but a website cannot get the list's
e-mail addresses just with an "img" embedded in a message and fetched from
that website.  That was the whole point.

End of thread.
for me at least. :-)



Regards,



I?igo Koch
Red Segura



-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040512/6a24c04a/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ