lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <8CD3D4C3E62F33A-D40-5712@web-mmc-m10.sysops.aol.com>
Date: Mon, 18 Oct 2010 22:27:01 -0400
From: king of pain <n3ptun3@...don.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Fwd: ipv6 flaw (is bullshit)


 I keep an eye on you Andrew. You're in my case load.

Just curious, care to go into any more detail on how the government has treated you? Few really know what it's like to be in a modern day cointelpro subject. I think people would like to know and you've been prudish on facts, probably out of a veritable casserole of fear, uncertainty, pain, daze and jade. I'd prefer to hear it in your own words; specifics if you have the courage.

 


 King of Pain, ePsyD



-----Original Message-----
From: Andrew Auernheimer <gluttony@...il.com>
To: king of pain <n3ptun3@...don.com>
Cc: full-disclosure@...ts.grok.org.uk
Sent: Mon, Oct 18, 2010 8:17 pm
Subject: Re: [Full-disclosure] Fwd: ipv6 flaw (is bullshit)


FYI---


the prosecution has refused to comply with discovery, effectively quietly droppin the charges. I walk.


On Mon, Oct 18, 2010 at 3:35 PM, king of pain <n3ptun3@...don.com> wrote:

Mr. Auernheimer,

..."Notions of criminal activity"[1]. Interesting. ZDNet is funded by sheep dumb enough to swallow retweeted blogcruft on shiny magazine stock. Why don't you represent yourself in a court if it's so libelous? And also if you do in fact have a brand you should register a trademark or servicemark to protect your rights.

How's that narcotics case coming along? 4 felonies was it?You claim you hacking iPads is a free speech case and, after all your bragging of substance abuse on the iProphet video, you suggest you may not hold culpability for this possession of this contraband because of your "landmark free speech case"? [2]

Enjoy Prison.

ZDNet,


  http://seclists.org/fulldisclosure/2010/Mar/84

You people at zdnet are also part of the problem. You are just another hack clogging the tubes with your spam and cruft. We don't need 50 news sources with identical content - you just get into blackhat spamwars with sensational article titles, topics on Google News and Magazine covers to get people to buy. You're a dying a breed. For christ sakes, instead of being a bunch of pretentious losers in thick rimmed glasses trying to hit on attention whores who don't put out. What is the matter with you.


 

Evidence:

[1] AUERNHEIMER, ANDREW. weev loves you. 2010-10-18. URL:http://weev.livejournal.com/. Accessed: 2010-10-18. (Archived by WebCite® at http://www.webcitation.org/5tZu573jE)
[2] AUERNHEIMER, ANDREW. Hypocrites and pharisees. 2010-10-18. URL:http://security.goatse.fr/hypocrites-and-pharisees. Accessed: 2010-10-18. (Archived by WebCite® at http://www.webcitation.org/5tZuhmpYn)

 


-----Original Message-----
From: Andrew Auernheimer <gluttony@...il.com>

To: full-disclosure@...ts.grok.org.uk

Sent: Mon, Oct 18, 2010 8:58 am
Subject: [Full-disclosure] Fwd: ipv6 flaw (is bullshit)










---------- Forwarded message ----------





From: Andrew Auernheimer <gluttony@...il.com>





Date: Mon, 18 Oct 2010 04:51:59 -0400





Subject: Re: ipv6 flaw





To: edit@...et.com.au





Cc: Eugene Teo <eugene@...hat.com>











Dear ZDnet,











This story: http://www.zdnet.com.au/4chan-finds-linux-kernel-flaw-for-attacks-339306657.htm





 is someone talking straight out of their ass. We have no such





exploit, If we did have such an exploit, there is absolutely no way we





would share it with external parties. Not 4chan, not anyone. Due to





the immense success and resiliency of the Linux platform, a 0-day





kernel remote is worth serious money ($100k+ if you know the right





buyers), and we would have given it to the highest bidder or put it on





Bugtraq for maximum industry publicity. We would not have given it





away for free to ineffectual idiots in their moms basements who aren't





accomplishing anything.











Beyond that, many of my closest friends make their living off of





intellectual property. I do not support defacement and DDoS as a





method of protest against anything, especially not a childish protest





against copyright. Authors have a right to charge however much they





please for their creative works. The people involved with these DDoS





attacks and web site defacements need to grow up and do something





useful with their lives.











This article is ridden with a number of verifiably false errors. I'm





sure a quick talk with Eugene from the Red Hat Linux corporation (he





is cc'd to this email) could get you in touch with Linus who could





confirm that no such communication with us ever existed. In addition,





while I am probably one of the most skilled web application and





browser exploit hackers in the world, I do not do kernel bugs. I have





never done kernel work, with the exception of some stuff I did years





ago related to Mac OS X kext. Every single bit of my previous public





research has been related to a web browser bug or a web application





bug. If someone in Goatse Security were to be involved with the





creation of a kernel-related exploit, it would not be me.











Lastly, my contact info is amazingly public. I was awake and checking





my email when your story was posted, and for the 11 or so hours





preceeding it. I have also talked with reporters at ZDnet previously,





including ZDnet Australia. So the next time you have the urge to print





libelous, sensational misinformation defaming both the integrity of my





information security working group and the security of Linux, please





give me an e-mail or phonecall first. The contact info is on the





Goatse Security website. I should be informed of this stuff by your





"journalists" (who are supposed to do things such as contact parties





involved in a suspect claim from a random anonymous idiot on the





Internet) and not someone from a major software vendor.











Thanks,





weev











On Mon, Oct 18, 2010 at 2:35 AM, Eugene Teo <eugene@...hat.com> wrote:





>





> Hi Weev,





>





> I read a ZDNet news report that you have discovered a Linux kernel 





vulnerability, and I am wondering if you will be willing to share the technical 





details of the flaw.





>





> http://www.zdnet.com.au/4chan-finds-linux-kernel-flaw-for-attacks-339306657.htm





>





> Thanks, Eugene





> --





> Eugene Teo / Red Hat Security Response Team















_______________________________________________







Full-Disclosure - We believe in it.





Charter: http://lists.grok.org.uk/full-disclosure-charter.html





Hosted and sponsored by Secunia - http://secunia.com/








 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



 

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ