lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4b6ee9310803291008s459baecexd33b982871045cf8@mail.gmail.com>
Date: Sat, 29 Mar 2008 17:08:43 +0000
From: n3td3v <xploitable@...il.com>
To: n3td3v <n3td3v@...glegroups.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: sans handler gives out n3td3v e-mail to public

On Sun, Mar 23, 2008 at 10:44 AM,  <taneja.security@...il.com> wrote:
> I think this the most worst and alarming situation ..where SANS like
> organization is doing the way.......... from onwards no body will report
> info to SANS........... E+1 t+1 b+1 j+1 it OFF!!!

SANS hasn't admitted a breach occured yet and they've had 7 days to
come up with the wording.

I haven't seen Joel Esler, the guy who breached my privacy back on
duty yet, but i've seen him and Johannes Ullrich talking on the
internet storm center mentioning podcasts
http://isc.sans.org/diary.html?storyid=4202

Why are they announcing podcasts when both Joel Esler and Johannes
Ullrich have a privacy breach still to publically acknowledge and
apologize for?

Maybe they thought Full-Disclosure mailing list members wouldn't
notice if they pretend the incident didn't take place and tried to
sweep it under the carpet?

Johannes Ullrich, you told me you were investigating Joel Esler
internally, so please tell me the findings, so I can paste them onto
Full-Disclosure.

n3td3v

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ