lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <473823665.20050407222100@Sniff-em.com>
Date: Thu Apr  7 21:21:08 2005
From: Thierry at sniff-em.com (Thierry Zoller)
Subject: Re: Case ID 51560370 - Notice of Claimed
	Infringement

Dear Thomas Sutpen,


>> More nice will be if this .iso file is just 451,486k of /dev/random junk.
>> Any proves that this file __IS__ Sybase Powerbuilder 9 Enterprise.iso?
>> MD5? Something?

The problem is much simpler, if 200 persons are sharing this ISO and if
it is confirmed to be a "pirated" version by downloading from ONE of
these users you can tell that the other 199 are also sharing the same
pirated versions, knowing that most (all) p2p applications use hashes to
identify the files. In other words, if 200 sources are listed all of
them are sharing the exact same file, at least if you trust the p2p
application code. (Which you can't proof does indeed work flawlessy
in this regards, but you get my point).

--
Thierry Zoller



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ