lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4ef5fec60512181128t48a1b028i78d5a4308090411c@mail.gmail.com>
Date: Sun Dec 18 19:29:01 2005
From: coderman at gmail.com (coderman)
Subject: BANTOWN PRESENTS: Give me 0day or give me death

On 12/17/05, Andrew A <gluttony@...il.com> wrote:
>...
>  I present to you the Eleatic school of hacker ethics.
>
> ... If your computer has been
> programmed to accept my arbitrary code, then there is no moral or ethical
> violation committed when I introduce my code to yours.

sounds good to me, but for pragmatic reasons.  all this bullshit
firewall/IDS/$snake_oil isn't working as advertised (but a false sense
of security so comforting).  perhaps that 7th or 8th remote
root/enable prompt exploit will open their eyes.

your approach may usher in the requisite least privilege based
capability model for network security that would actually be worth a
shit.  (of course, identity management will probably still suck, so
maybe this is wishful thinking...)

see you in Club Fed my brother!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ