lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <c05e325a0706290850s6ee408d0pee98bf8c79fd70f@mail.gmail.com>
Date: Fri, 29 Jun 2007 16:50:16 +0100
From: bambam <bambam.quiescence@...glemail.com>
To: full-disclosure@...ts.grok.org.uk
Subject: blackhat talk pulled inexplicably (at the risk of
	violating MONBACOPL)

So by now you've almost certainly read:

http://www.networkworld.com/news/2007/062707-black-hat.html

MY HYPOTHESIS on what has happened is that:

1) The technology is very flawed
2) The patch requires hardware to be re-issued, which causes all kinds
of law-suits, broken contracts and SLAs, basically it's a legal
nightmare.
3) The reason for the inexplicable pull out is a heavy legal threat
aimed directly at the presenter/research/their company.
4) Other people have broken this and are already pwning crypto
technology based on it

But I have *no* evidence at all. Anyone got any more information so we
can piece this together?

bambam

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ