lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: etomcat at freemail.hu (Feher Tamas)
Subject: RIM Blackberry buffer overflow, DoS, data loss

Hello,

Would someone please enlighten Mr. Hexview and tell him that
his words "HexView does not notify vendors unless there is a
prior agreement to do so" sound very much like an extortion
attempt (racketeering?)

He(x) should be aware of how easy it is to find yourself in
a brig at Gitmo held in secrecy these days.

Phone networks and services carried over phone technology
have always been considered critical infrastructure, unlike
the Internet and thus you could be classified as organized
crime or even a terrorist (for threatening to target
critical infrastucture as part of a conspiracy to commit
extortion). Thus RIM-Berry as a target is NOT a wise idea.

Apart from law enforcement, one would think HexView has
enough common sense not to cross swords with the world's
largest companies, who all support and are financially
interested in the success of the famed RIMBerry. Hexview can
only be the loser in the end.

Hey HexView hear the message: be a nice guy and tell the
vendors when you find some bug!

They will fix it and put your real name in the security
advisory. You'll be famous and find some good job. Having
problems with not having girls is no good reason for black
hat hacking. After all, prosituates are NOT available for
rent in
most prisons, so your sex troubles will not be solved in the
cooler. If you get a good job and buy a fancy car, it will
be much easier to pick up chicks.

Regards: Tamas Feher.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ