lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <y2p2d6724811004291013g96688522odb36123eeaff8f9d@mail.gmail.com>
Date: Thu, 29 Apr 2010 13:13:52 -0400
From: T Biehn <tbiehn@...il.com>
To: Stephen Mullins <steve.mullins.work@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: go public to avoid jail

But he was a verified paypal buyer, your honor.
lols.
-Travis

On Thu, Apr 29, 2010 at 12:32 PM, Stephen Mullins <
steve.mullins.work@...il.com> wrote:

> That might work if you went through some sort of "official" channels
> with a bill of sale and so forth.  Claiming that you sold it to "some
> guy on irc" after a paypal payment cleared your account probably
> wouldn't be much of a defense in court.
>
> On Thu, Apr 29, 2010 at 12:05 PM, T Biehn <tbiehn@...il.com> wrote:
> > Or you could just auction it off to the 'highest bidder.'
> >
> > -Travis
> >
> > On Tue, Apr 27, 2010 at 6:48 PM, J Roger <securityhocus@...il.com>
> wrote:
> >>
> >> An important lesson from childhood, sharing, could help keep you out of
> >> jail.
> >>
> >> According to the following (dated) Wired article,
> >> http://www.wired.com/threatlevel/2009/12/stephen-watt/ Stephen Watt got
> >> screwed because he supplied his friend with a software tool he wrote and
> his
> >> friend used it to commit a crime.
> >>
> >> Had Stephen released his tool to the public (with as much or as little
> >> fanfare as he liked) would he still have gone to jail?
> >>
> >> He could make a good argument for legitimate uses of his tool as well.
> It
> >> would be useful for anyone performing a PCI penetration test in
> compliance
> >> with PCI DSS 11.3
> >>
> >> Remember kids, sharing is caring (that you not spend the next 2 years in
> >> federal prison)
> >>
> >> _______________________________________________
> >> Full-Disclosure - We believe in it.
> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >> Hosted and sponsored by Secunia - http://secunia.com/
> >
> >
> >
> > --
> > FD1D E574 6CAB 2FAF 2921  F22E B8B7 9D0D 99FF A73C
> >
> http://pgp.mit.edu:11371/pks/lookup?search=tbiehn&op=index&fingerprint=on
> > http://pastebin.com/f6fd606da
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>



-- 
FD1D E574 6CAB 2FAF 2921  F22E B8B7 9D0D 99FF A73C
http://pgp.mit.edu:11371/pks/lookup?search=tbiehn&op=index&fingerprint=on
http://pastebin.com/f6fd606da

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ