lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080903190158.944BF20047@smtp.hushmail.com>
Date: Wed, 03 Sep 2008 15:01:55 -0400
From: redb0ne@...h.com
To: full-disclosure@...ts.grok.org.uk, xploitable@...il.com
Subject: Re: Google Chrome Browser Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



On Wed, 03 Sep 2008 14:47:22 -0400 n3td3v <xploitable@...il.com>
wrote:
>On Wed, Sep 3, 2008 at 5:06 PM,  <Valdis.Kletnieks@...edu> wrote:
>> I'd place bets that whoever it is, they're on the RBN payroll...
>>
>
>I thought a high ranking security professional like yourself would
>stick to facts, not the latest disinformation handed out by so-
>called
>"trusted" security professionals. Marcus Sachs is good at it, Sans
>is
>good at it. We already know the CIA use Sans for it,
>http://www.securityfocus.com/brief/666. Yet you continue to hang
>out
>with them on #dshield on Freenode. You are being led up a garden
>path
>by power hungry folks feeding the media news about anything they
>can
>orchestrate to ramp up cyber security as a national security
>agenda
>item as the next administration is coming in so they can become
>more
>powerful in Washington, yet you still trust them.

I'd like to see you provide some proof that this is
"disinformation" aside from your delusional
theories.

There has been plenty of proof that RBN is a real threat, if you
are going to try and call
people out on spreading misinformation, then you need to be
prepared to present a counter
argument proving it is disinformation. Otherwise all you are doing
is flapping your mouth off.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Charset: UTF8
Version: Hush 3.0

wpwEAQMCAAYFAki+3yIACgkQGwcl4JwqQeAHagP/aRprRXQYDWWL6tFJ4Ee+QywkG+dZ
GV0HdSOUNQGEGdUygvtjIXztlRZuNza0/eSdDwaxDKoM2POCjpcRXoOfikA419S8XrqA
L7gFcL5Xn5I/NFO0sIhH/Co4gtlGdxe6nLNzCNc+8BS4rnf77cSJNGINQpkAfwxsYfiY
WnZB+yo=
=i1Ep
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ