lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTi=5Ok102pQpxF+NeCFsDEue9GcDBFhFH8s29645@mail.gmail.com>
Date: Thu, 21 Oct 2010 13:08:25 -0400
From: Jeffrey Walton <noloader@...il.com>
To: "Cal Leeming [Simplicity Media Ltd]" <cal.leeming@...plicitymedialtd.co.uk>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: wikileaks still under attack,
	pressure revved up

Hi Cal,

> I can appreciate his previous efforts, but what he has done here is put many
> lifes at risk, both civilians and soldiers.
Agreed.

Just to play devils advocate:
Would Barrack Obama also be culpable? His campaign platform included a
withdrawl from Iraq (Afghanistan was a different story). So troops are
still there because he [apparently] lied to [fraudulently] obtain the
office.

If the troops weren't there, then the troops would not be at risk, and
there would be no wiki leaks story. quod erat demonstrandum.

Jeffrey Walton
Baltimore, MD, US

On Thu, Oct 21, 2010 at 12:51 PM, Cal Leeming [Simplicity Media Ltd]
<cal.leeming@...plicitymedialtd.co.uk> wrote:
> This will be my first and last post on this topic (again).
> I've just finished watching some videos about what wikileaks have been
> doing.
> It appears that they released a bunch of documents that revealed information
> such as GPS co-ords + details of those who co-op'd with soldiers. He also
> posted the names of these people too, and a bunch of information which
> could jeopardise the protection of soldiers on the ground, from all
> countries.
> I can appreciate his previous efforts, but what he has done here is put many
> lifes at risk, both civilians and soldiers.
> So, if the US military have launched an all our war on Wikileaks, whether it
> be legal or not, I can't say it would be entirely shocking.
> On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens <harry@...rens.com> wrote:
>>
>> Sorry to all of those who think this is "gossiping", but:
>>
>> Wikileaks has been down for ca. 2 weeks now during which time the US has
>> at least cut off their financial channels.
>> This during a period where WL has announced another major leak release
>> this time re. Iraq.
>> What is also extremely disconcerting is the absolute silence of _all_
>> main street media to the topic (gag...?)
>>
>> Now the latest tweet reads:
>> "WikiLeaks communications infrastructure is currently under attack.
>> Project BO move to coms channel S. Activate Reston5."
>>
>> Yet again I would like to pint out that there seems to be a concerted
>> high power attack going on against WL
>> And yet again I would like to point out it would be interesting to know
>> what is rally happening.
>> And yet again I'd like to emphasize that this indeed a security issue;
>> it does concern netizens and citizens in general if major government
>> organisations engage in what seems to be a dirty war against a
>> whistleblowing organisation.
>>
>> If anybody knows more, pls. do share insights...
>>
>>     Harry
>>
>
> --
>
> Cal Leeming
>
> Operational Security & Support Team
>
> Out of Hours: +44 (07534) 971120 | Support
> Tickets: support@...plicitymedialtd.co.uk
> Fax: +44 (02476) 578987 | Email: cal.leeming@...plicitymedialtd.co.uk
> IM: AIM / ICQ / MSN / Skype (available upon request)
>
> Simplicity Media Ltd. All rights reserved.
> Registered company number 7143564
>
>
>
> --
>
> Cal Leeming
>
> Operational Security & Support Team
>
> [SNIP]

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ