lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4b6ee9310806021312y58044239ifee07431c7597910@mail.gmail.com>
Date: Mon, 2 Jun 2008 21:12:24 +0100
From: n3td3v <xploitable@...il.com>
To: full-disclosure@...ts.grok.org.uk
Cc: send-us-news-tips@...t.com
Subject: Fwd: Comments on: Phoenix Mars Lander site hacked

I want to know the language of the attackers, the world is waiting.

This is the biggest scandal in infosec that the language of the attackers
hasn't been publically released.

All the best,

n3td3v

---------- Forwarded message ----------
From: n3td3v <xploitable@...il.com>
Date: Mon, Jun 2, 2008 at 8:35 PM
Subject: Comments on: Phoenix Mars Lander site hacked
To: n3td3v <n3td3v@...glegroups.com>


by n3td3v  02 June 2008 12:28

You guys leave yourself open to verbal attacks with your stupidity of
not caring what language the attackers used. I think the key part of
the story is what the language and country is of the attackers. Wait,
it'll be the chinese, and china... since thats America's number one
scape goat cyber enemy. The secret service told University of Arizona
not to release the language of the attackers, until its been OK'd by
bush etc that they can fabricate that china done it, to further the
U.S's cyber political agenda.

http://news.cnet.com/8601-10784_3-9957275.html?communityId=2066&targetCommunityId=2066&messageId=732926#732926

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ