lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <9E97F0997FB84D42B221B9FB203EFA273F3354@dc1ms2.msad.brookshires.net>
From: toddtowles at brookshires.com (Todd Towles)
Subject: FW: Shadowcrew Grand Jury Indictment

Well, it is given that posting to FD does give a site exposure (good and
bad). But I wouldn't say that FD was the cause of it..it was the illegal
activity that was the cause of it. We all know SCC does some underground
stuff and they post here each time they move. So...I wouldn't blame the
FD list for anything. 

> -----Original Message-----
> From: n3td3v [mailto:xploitable@...il.com] 
> Sent: Wednesday, November 17, 2004 10:37 AM
> To: Todd Towles; full-disclosure@...ts.netsys.com
> Subject: Re: FW: [Full-Disclosure] Shadowcrew Grand Jury Indictment
> 
> On Wed, 17 Nov 2004 09:26:12 -0600, Todd Towles 
> <toddtowles@...okshires.com> wrote:
> > I sent this to n3td3v yesterday. Why look into the news..just go to 
> > the DOJ website...st8r to the fish's mouth.
> > 
> > Indictment for hundreds of credit cards, UK passports, 
> state licenses, 
> > school IDs, bank accounts...etc..
> 
> Are we right in thinking it was the Full-Disclosure list who 
> initially brought the shadowcrew site to the attention of the 
> intelligence agencies? I was under that impression, where is 
> the credit where its due by journalists and authorites?! I 
> don't see much mention of "Shadowcrew busted after a thread 
> post on a security mailing list about the site". Maybe i've 
> got my facts crossed again, but yeah.
> 
> Thanks,
> n3td3v
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ